Showing 530 open source projects for "risk"

View related business solutions
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 1
    Synthetix

    Synthetix

    Synthetix Solidity smart contracts

    Synthetix is a new financial primitive enabling the creation of synthetic assets, offering unique derivatives and exposure to real-world assets on the blockchain. Leveraging the Synthetix debt pool and our innovative liquidity framework, our traders are guaranteed to have some of the best price execution around, with little to no slippage and fills you can’t get elsewhere. Capture the price movements of popular cryptocurrencies, fiat currencies, stocks, commodities and more with zero...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    ssh deployments

    ssh deployments

    GitHub Action for deploying code via rsync over ssh. (with NodeJS)

    ...This action would usually follow a build/test action which leaves deployable code in GITHUB_WORKSPACE. The keys should be generated using the PEM format. Check your keys. Check your deployment paths. And use at your own risk.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    YugabyteDB

    YugabyteDB

    The high-performance distributed SQL database for global apps

    ...Deploy YugabyteDB in public, private, and hybrid cloud environments, on VMs, containers, or bare metal. Lower TCO for dev, staging, and production deployments. Powering a wide range of cloud-native workloads. Risk-free migration from on-prem to the cloud.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    formidable

    formidable

    The most used, flexible, fast and streaming parser

    ...The maintainers of formidable and thousands of other packages are working with Tidelift to deliver commercial support and maintenance for the Open Source dependencies you use to build your applications. Save time, reduce risk, and improve code health, while paying the maintainers of the exact dependencies you use. Of course, with Koa v1, v2 or future v3 the things are very similar. You can use formidable manually as or through the koa-better-body package which is using formidable under the hood and support more features and different request bodies, check its documentation for more info.
    Downloads: 0 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 5
    Eclair

    Eclair

    A scala implementation of the Lightning Network

    ...Eclair's JSON API should NOT be accessible from the outside world (similarly to Bitcoin Core API). Eclair requires Bitcoin Core 0.20.1 or 0.21.1. (other versions of Bitcoin Core are not actively tested - use at your own risk). If you are upgrading an existing wallet, you may need to create a new address and send all your funds to that address. Eclair needs a synchronized, segwit-ready, zeromq-enabled, wallet-enabled, non-pruning, tx-indexing Bitcoin Core node. You must configure your Bitcoin node to use bech32 (segwit) addresses.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    FinRobot

    FinRobot

    An Open-Source AI Agent Platform for Financial Analysis using LLMs

    ...The framework also tends to include automation layers for deployment, enabling trained models to operate in live or simulated environments with scheduled re-training and risk controls in place.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    RE2/J

    RE2/J

    linear time regular expression matching in Java

    ...It achieves this efficiency by simulating all possible matches in a single pass using a nondeterministic finite automaton (NFA), ensuring predictable and safe performance even with complex patterns. This makes RE2/J ideal for applications that must handle user-supplied regular expressions securely without the risk of denial-of-service through regex backtracking. While it omits some advanced features like backreferences and certain Java regex options, it supports the vast majority of practical expressions used in production code. RE2/J thus provides a reliable, safe, and scalable alternative for developers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Conscrypt

    Conscrypt

    Conscrypt is a Java Security Provider

    ...The provider focuses on contemporary protocol hygiene—up-to-date cipher suite selection, ALPN, session resumption, and hardened defaults—so Java servers and clients negotiate secure connections by construction. Because it builds on BoringSSL’s audited primitives and constant-time implementations, it reduces the risk of subtle side-channel issues while improving handshake and bulk crypto throughput. Conscrypt also exposes platform accelerations (like AES-GCM and ChaCha20-Poly1305) and supports features important to HTTP/2 and HTTP/3 stacks. Its goal is pragmatic: deliver a fast, well-maintained TLS provider that behaves like modern browsers and mobile stacks.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    LitterBox

    LitterBox

    A secure sandbox environment for malware developers and red teamers

    ...Repo metadata and author pages highlight an active security-tools ecosystem around the maintainer, with CI and pull-request activity suggesting ongoing development. The project positions itself as a safe proving ground to reduce surprises in the field while minimizing operational risk. For teams exploring MCP integrations, notes mention pairing with LLM agents for assisted analysis.
    Downloads: 0 This Week
    Last Update:
    See Project
  • MyQ Print Management Software Icon
    MyQ Print Management Software

    SAVE TIME WITH PERSONALIZED PRINT SOLUTIONS

    Boost your digital or traditional workplace with MyQ’s secure print and scan solutions that respect your time and help you focus on what you do best.
    Learn More
  • 10
    ThreatMapper

    ThreatMapper

    Open source cloud native security observability platform

    ...Experience rapid threat detection and remediation, while significantly reducing non-critical security alerts by 90%. Deepfence ThreatMapper hunts for threats in your production platforms, and ranks these threats based on their risk of exploit. It uncovers vulnerable software components, exposed secrets, and deviations from good security practices. ThreatMapper uses a combination of agent-based inspection and agent-less monitoring to provide the widest possible coverage to detect threats. ThreatMapper carries on the good 'shift left' security practices that you already employ in your development pipelines. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Amazon EC2 Spot Interrupter

    Amazon EC2 Spot Interrupter

    CLI tool that triggers Amazon EC2 Spot Interruption Notifications

    ...Applications that are able to gracefully handle this notification and respond by check pointing or draining work can leverage Spot for deeply discounted compute resources! In addition to Interruption Notifications, Rebalance Recommendation Events are sent to spot instances that are at higher risk of being interrupted. Handling Rebalance Recommendations can potentially give your application even more time to gracefully shutdown than the 2 minutes an Interruption Notification would give you. It can be challenging to test your application's handling of Spot Interruption Notifications and Rebalance Recommendations.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Bull

    Bull

    Queue package for handling distributed jobs and messages in NodeJS

    ...Inspect jobs, search, retry, or promote delayed jobs. Metrics and statistics, and many more features. Queues are robust and can be run in parallel in several threads or processes without any risk of hazards or queue corruption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Apache Druid

    Apache Druid

    A high performance real-time analytics database

    ...Druid combines novel storage ideas, indexing structures, and both exact and approximate queries to return most results in under a second. Druid unlocks new types of queries and workflows for clickstream, APM, supply chain, network telemetry, digital marketing, risk/fraud, and many other types of data. Druid is purpose built for rapid, ad-hoc queries on both real-time and historical data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Koila

    Koila

    Prevent PyTorch's `CUDA error: out of memory` in just 1 line of code

    ...The library introduces a lazy evaluation mechanism that delays computation until it is actually required, allowing the framework to better estimate the memory requirements of a model before execution. By building a computational graph first and executing operations only when necessary, koila reduces the risk of running out of GPU memory during the forward pass of neural network training. This approach enables developers to experiment with larger batch sizes and more complex architectures while maintaining stable training behavior. The system acts as a thin wrapper around PyTorch tensors and operations, meaning that it integrates easily into existing PyTorch code without requiring major changes to model implementations. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    CF-Workers-docker.io

    CF-Workers-docker.io

    Docker Warehouse Image Proxy Tool

    ...The project’s README warns about possible policy risks—since Cloudflare’s terms forbid use of Workers for VPN or similar proxy services, so users deploy at their own risk. It also includes instructions for setting up both Docker daemon and containerd/podman equivalents by customizing configuration files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    hithesis

    hithesis

    LaTeX thesis template package for Harbin Institute of Technology

    ...It supports Chinese and English typesetting, sensible defaults for fonts, and modern engines like XeLaTeX for robust CJK support. Cross-references, numbering, and page layout are automated, reducing the risk of last-minute formatting errors before submission. Clear build instructions and commented examples help you slot in your content while keeping the required style intact.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    SecretScanner

    SecretScanner

    Find secrets and passwords in container images and file systems

    Deepfence SecretScanner can find unprotected secrets in container images or file systems. Secrets are any kind of sensitive or private data that gives authorized users permission to access critical IT infrastructure (such as accounts, devices, networks, cloud based services), applications, storage, databases, and other kinds of critical data for an organization. For example, passwords, AWS access IDs, AWS secret access keys, Google OAuth Key etc. are secrets. Secrets should be strictly kept...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Mina

    Mina

    Mina is a new cryptocurrency with a constant size blockchain

    ...But Mina’s zkApps, smart contracts powered by zero-knowledge, keep users in control of their privacy by validating and sharing proofs of their data, rather than the data itself. Think about getting a loan by simply sharing a proof of your personal ID and credit score, rather than the data itself. No risk of your personal information being hacked or sold. You are the only one owning your data, and it never leaves your device.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    eslint-plugin-import

    eslint-plugin-import

    ESLint plugin with rules that help validate proper imports.

    ...The maintainers of eslint-plugin-import and thousands of other packages are working with Tidelift to deliver commercial support and maintenance for the open-source dependencies you use to build your applications. Save time, reduce risk, and improve code health, while paying the maintainers of the exact dependencies you use. With the advent of module bundlers and the current state of modules and module syntax specs, it's not always obvious where import x from 'module' should look to find the file behind module. Up through v0.10ish, this plugin has directly used substack's resolve plugin, which implements Node's import behavior. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Nano ID

    Nano ID

    A secure, URL-friendly, unique string ID generator for JavaScript

    ...However, this probability is extremely small. Meanwhile, a lot of projects generate IDs in small numbers. For those projects, the ID length could be reduced without risk. This calculator aims to help you realize the extent to which the ID length can be reduced. Instead of using the unsafe Math.random(), Nano ID uses the crypto module in Node.js and the Web Crypto API in browsers. These modules use unpredictable hardware random generator. Uniformity, random % alphabet is a popular mistake to make when coding an ID generator. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    AutoTrader

    AutoTrader

    A Python-based development platform for automated trading systems

    ...It provides tools for backtesting, strategy optimization, visualization, and live trading integration. A feature-rich trading simulator, supporting backtesting and paper trading. The 'virtual broker' allows you to test your strategies in a risk-free, simulated environment before going live. Capable of simulating multiple order types, stop-losse,s and take-profits, cross-exchange arbitrage and portfolio strategies, AutoTrader has more than enough to build a profitable trading system.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 22
    MetricFlow

    MetricFlow

    MetricFlow allows you to define, build, and maintain metrics in code

    ...When a user or tool requests a metric (e.g., “monthly revenue by region”), MetricFlow generates optimized, warehouse-specific SQL to compute that metric, handling joins, filters, time grains, offsets, and other complexities under the hood. Because metric definitions live centrally, you avoid duplication across teams and tools, reduce risk of inconsistent numbers, and make it easier to audit and evolve the logic over time. The project emphasizes explainability, performance and portability: you define metrics once and then they can be consumed in BI tools, notebooks, or even AI/agent-driven workflows.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    GOAD (Game of Active Directory)

    GOAD (Game of Active Directory)

    game of active directory

    ...Analysts can filter, cluster, and explore these relationships to identify infrastructure patterns, potential subdomains, or attack surfaces. Integrations may include metadata like geolocation, WHOIS, and risk scoring to prioritize leads. GOAD helps teams transition from fragmented OSINT tools to a unified reconnaissance dashboard where exploration and filtering are first-class.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Monolog

    Monolog

    Sends logs to files, sockets, inboxes, databases and web services

    ...Internally Monolog still uses its own level scheme since it predates PSR-3. Tidelift delivers commercial support and maintenance for the open source dependencies you use to build your applications. Save time, reduce risk, and improve code health, while paying the maintainers of the exact dependencies you use. Monolog 1.x support is somewhat limited at this point and only important fixes will be done. You should migrate to Monolog 2 where possible to benefit from all the features.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Greenplum Database

    Greenplum Database

    Massive parallel data platform for analytics, machine learning and AI

    Rapidly create and deploy models for complex applications in cybersecurity, predictive maintenance, risk management, fraud detection, and many other areas. With its unique cost-based query optimizer designed for large-scale data workloads, Greenplum scales interactive and batch-mode analytics to large datasets in the petabytes without degrading query performance and throughput. Based on PostgreSQL, Greenplum provides you with more control over the software you deploy, reducing vendor lock-in, and allowing open influence on product direction. ...
    Downloads: 26 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB