Security Dashboard

69,901
Vulnerabilities
3,576
Critical CVEs
2,078,133
Credential Leaks
571,347
Critical Secrets
455,749
Open Issues
2246195h
Total Tech Debt
105,398
Gates Passed
Repobility · open methodology · https://repobility.com/research/
50,893
Gates Failed

Quality Gate Results

105,398 passed / 50,893 failed (67% pass rate)

Risk Score Distribution

A
65,492
B
6,958
C
50

Tech Debt Breakdown (2,246,195h total)

Duplication
639,228h
Complexity
617,777h
Structure
410,328h
Practices
339,658h
Security
208,621h
Dependencies
30,164h

DORA Metrics Overview

Medium
8,954 repos
High
4,192 repos
Elite
802 repos

Integrated Security Tools

trivy Version:
syft syft
grype grype
bandit bandit
pip-audit pip-audit
retire 5.4.2

Most Vulnerable Repos

Analysis by Repobility (https://repobility.com) · MCP-ready
RepositoryLanguageVulnerabilities
Iranians-Vote-Digital-Democracy__vote-pass-monorepojson321 40 critical
0aub__saudi-sentinalpython324 36 critical
ponylight__TradingAgents-improvedpython316 29 critical
Taurus-Ai-Corp__Comply.Q-Gridtypescript268 26 critical
mislavs__moonboard-graderpython272 24 critical
UMAprotocol__protocoljavascript188 23 critical
Optimal-Living-Systems__deepflowjson212 21 critical
Optimal-Living-Systems__deepflomarkdown209 21 critical
Brain-up__brnkotlin198 21 critical
kipyin__handoffpython208 19 critical

Top Credential Leaks

Generated by the Repobility scanner · https://repobility.com
RepositoryFindings
AftermathFinance__aftermath-ts-sdk1912 1880 critical
QRun-IO__qbit-wms1620 1608 critical
ToaruPen__Caves-of-Qud_Japanese1314 1233 critical
bmo890__song-seed830 830 critical
HenryGill4__Vectrik820 820 critical
arwer13__life-dashboard788 784 critical
BizTechoff__donation804 780 critical
AdKats__Procon-1733 695 critical
ARobicsek__howzeverything666 648 critical
dholab__nhp-immunogenomics879 636 critical
Methodology: Repobility · https://repobility.com/research/state-of-ai-code-2026/

Binary Composition Intelligence BinComp v2

Binary-level security analysis of the Python ecosystem. 9 analysis techniques, 16 attack chains, N-way composition findings. Data updated hourly.

373
ELF Binaries Scanned
1,066
Composition Findings
343
Enriched (Gemma4)
39,861
3-Way Co-Occurrences
474
PyPI Pkgs Crawled
Enriched findings by severity:
214 CRITICAL125 HIGH4 MEDIUM

Top 10 Dangerous PyPI Packages

Repobility · the analyzer behind every row · https://repobility.com
PackageGradeGadgetsBinsRisk
Repobility · open methodology · https://repobility.com/research/
pillowF7,1012612,554
urllib3N0011,455
transformersN0010,146
aiohttpF35448,061
cryptographyD2,14717,302
fastmcpN005,776
semverN005,565
litellmN005,511
langchain-coreN005,428
torchF1,257135,117
Grade: A=hardened, F=unhardened. Risk combines CVE history + composition findings + hardening gaps.

Top Enriched Findings (AI-analyzed)

CRITICALCVSS 9.8ct
The use of `strcat` across multiple, unrelated libraries (e.g., `libarrow`, `libcrypto`, `libc`) indicates a widespread failure to use safe string handling functions. `strcat` is inherently unsafe as it relies on manual length checks, making it susceptible to classic stack-based …
CRITICALCVSS 9.8ct
The use of `strcpy` without explicit bounds checking constitutes a classic stack-based buffer overflow vulnerability. Since `strcpy` copies bytes until it encounters a null terminator, it blindly trusts the source buffer size. If the source string exceeds the allocated size of th…
CRITICALCVSS 9.8ct
The vulnerability stems from the widespread, unsafe use of `sprintf` across numerous core scientific and system libraries. `sprintf` writes to a destination buffer without bounds checking, leading to classic stack-based buffer overflows if the input data exceeds the allocated siz…