DevSecKit is a terminal-first DevSecOps scanner orchestrator for running SAST, SCA, Secrets, IaC, DAST, and IAST workflows from one CLI command.
- GitHub Pages demo:
https://imharshitaa.github.io/DevSecKit/demo/ - Demo source: https://imharshitaa.github.io/DevSecKit/demo/
Use devsec (wrapper for devseckit.py):
./devsecYou can still run directly:
./devseckit.pysast: Semgrepsca: Dependency-Check + Trivysecrets: Gitleaks + TruffleHogiac: Checkovdast: OWASP ZAP baselineiast: Runtime header/cookie checks
- Choose target mode:
Scan local source directoryScan remote directory (provide the git URL)
- Choose scan type(s):
sast,sca,secrets,iac,dast,iast, orall - If
dast/iastselected, provide running target URL. - Review terminal report + JSON report in
reports/combined_report.json.
git clone https://github.com/imharshitaa/DevSecKit.git
cd DevSecKit
chmod +x devsec devseckit.py scanners/**/**/*.sh- Semgrep:
pipx install semgrep - Trivy:
brew install trivy - Dependency-Check: install from OWASP Dependency-Check
- Gitleaks: install from gitleaks releases
- TruffleHog:
brew install trufflehog - Checkov:
pipx install checkov - DAST: Docker Desktop
- IAST-lite: Python 3
./devsechttps://github.com/juice-shop/juice-shophttps://github.com/WebGoat/WebGoathttps://github.com/digininja/DVWAhttps://github.com/OWASP/NodeGoat
DevSecKit/
├── devsec # primary launcher command
├── devseckit.py # orchestrator + parser + report formatter
├── demo/
│ └── index.html # terminal-style GitHub Pages demo
├── scanners/
│ ├── sast/semgrep.sh
│ ├── sca/dependencycheck.sh
│ ├── sca/trivy.sh
│ ├── secrets/gitleaks.sh
│ ├── secrets/trufflehog.sh
│ ├── iac/checkov.sh
│ ├── dast/zap.sh
│ └── iast/iast.sh
├── reports/ # generated scanner outputs + combined report
└── targets/ # cloned remote repositories for scanning
- Target acquisition layer
- local path scan or remote git clone into
targets/
- local path scan or remote git clone into
- Category orchestration layer
- grouped categories run one or more tool scripts (e.g.,
scaruns both DC + Trivy)
- grouped categories run one or more tool scripts (e.g.,
- Execution & resilience layer
- preflight checks, per-tool execution, continue-on-failure behavior
- Parsing & normalization layer
- converts tool-native JSON output into unified security findings format
- Reporting layer
- terminal report with severity + location + remediation
- machine-readable
reports/combined_report.json
- If one scanner fails, others continue.
- Reports are generated under
reports/. - For DAST/IAST, target app must be running and reachable.
- If Docker socket permissions fail, run scanners with local binaries or fix Docker access.