Help developers discover the tools you use. Get visibility for your team's tech choices and contribute to the community's knowledge.
Someone has found a potential security issue with your technology. What happens next? Making certain this discovery leads to a positive outcome for everyone involved is crucial. Replacing an antiquated security@ mailbox with the HackerOne platform brings order and control to an otherwise chaotic process. | Protect your Node.js projects from supply chain attacks. Scan npm packages for malware, crypto-drainers, and security vulnerabilities. Real-time threat intelligence database tracking malicious packages. |
Vulnerability handling;Multi-party coordination;Flexible integration;Access permission controls;Private and public programs;Duplicate report detection;Advanced analytics;Hacker reputation;Bounties and rewards;Managed services partners;Trigger and bulk actions;Data portability | Real-time malicious package detection, Deep static analysis for suspicious scripts, Typosquat and impersonation detection, Obfuscated code pattern scanning, Crypto-drainer and wallet-stealer detection, Dependency risk scoring, Abandoned and unmaintained package alerts, Install-script behavior analysis, Malware signature database, Security vulnerability indicators, Zero-setup package scanning, Instant risk report generation, Threat intelligence dashboard, Package metadata trust scoring, Automated reputation and maintainer checks |
Statistics | |
Stacks 80 | Stacks 0 |
Followers 167 | Followers 1 |
Votes 23 | Votes 1 |
Pros & Cons | |
Pros
| No community feedback yet |
Integrations | |
| No integrations available | |

Our Crowdcontrol platform safely connects you to a curated community of 8,300 security researchers to securely capture, triage and reward vulnerabilities in your code. Reduce your effort by over 85% and get back to work!

Sign up for free in just a few minutes and ask our top researchers to evaluate the security of your web or mobile app. Decide to run either a bug bounty program or an agile crowdsourced security audit. Choose from our Core of vetted researchers or the whole Crowd.

Enlist the help of vetted security experts to find bugs and vulnerabilities in your software.