DevSecKit is a terminal-based DevSecOps scanner orchestrator.
It can:
- ask whether you want to scan a local source folder or a remote repository
- clone repository code automatically (when repo mode is selected)
- run security scan workflows individually or all at once
- print readable, colorized findings with severity and location
- generate a combined machine-readable report at
reports/combined_report.json
sast: Semgrep (static code analysis)sca: Dependency-Check + Trivy (dependency vulnerabilities)secrets: Gitleaks + TruffleHog (secret detection)iac: Checkov (IaC misconfiguration)dast: OWASP ZAP Baseline (web runtime scan)iast: IAST-lite runtime checks (security headers)
DevSecKit/
├── devseckit.py
├── scanners/
│ ├── sast/semgrep.sh
│ ├── sca/dependencycheck.sh
│ ├── sca/trivy.sh
│ ├── secrets/gitleaks.sh
│ ├── secrets/trufflehog.sh
│ ├── iac/checkov.sh
│ ├── dast/zap.sh
│ └── iast/iast.sh
├── reports/
└── targets/
Run the terminal tool:
./devseckit.pyInteractive flow:
- Choose target mode: local source or repository clone.
- Provide path or git URL.
- Choose scan types (
allor selected types). - Provide URL if DAST/IAST is selected.
- View formatted results and open combined report JSON.
Install only the tools you plan to run:
- Semgrep:
pipx install semgrep - Dependency-Check: OWASP Dependency-Check
- Trivy:
brew install trivy - Gitleaks: gitleaks releases
- TruffleHog:
brew install trufflehog - Checkov:
pipx install checkov - DAST: Docker (for OWASP ZAP container)
- IAST-lite: Python 3 + curl
- If one scan fails (missing tool, runtime issue), DevSecKit continues with other scans.
- Scan outputs are written to
reports/. - Repositories scanned in clone mode are stored in
targets/.