Try our new research platform with insights from 80,000+ expert users

GitHub Code Scanning vs SiteLock comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 8, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

GitHub Code Scanning
Ranking in Static Application Security Testing (SAST)
15th
Average Rating
8.6
Reviews Sentiment
6.7
Number of Reviews
6
Ranking in other categories
No ranking in other categories
SiteLock
Ranking in Static Application Security Testing (SAST)
52nd
Average Rating
6.6
Reviews Sentiment
8.1
Number of Reviews
3
Ranking in other categories
CDN (20th), Web Application Firewall (WAF) (39th), Distributed Denial-of-Service (DDoS) Protection (28th)
 

Mindshare comparison

As of January 2026, in the Static Application Security Testing (SAST) category, the mindshare of GitHub Code Scanning is 1.6%, up from 0.7% compared to the previous year. The mindshare of SiteLock is 0.4%, up from 0.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Static Application Security Testing (SAST) Market Share Distribution
ProductMarket Share (%)
GitHub Code Scanning1.6%
SiteLock0.4%
Other98.0%
Static Application Security Testing (SAST)
 

Featured Reviews

AK
Software Development Manager at Amazon
Code scanning identifies vulnerabilities quickly and improves team response with minimal setup
I have been using Git for approximately 13-14 years. I have used GitHub Code Scanning for about three to four years. The primary purpose is to identify any vulnerability in the code itself. The system logs vulnerabilities that we can immediately examine to see all the error-prone areas. The AI functionalities include predefined agents that scan through and immediately provide responses regarding the best nomenclature or code coverage percentage. It's actually a one-time setup, and the team benefits as long as they push code and changes in the repository itself. Every time we push something, we immediately check the total deviation, whether our code coverage has improved, or if any vulnerability has been identified. There is always a metrics dashboard that we can see and identify. Primarily, GitHub is used for doing the versioning itself in the repository. With vulnerability functionality being provided and AI agents available, it makes a complete package. As soon as we publish our code, we immediately get to know the test code coverage. This immediately informs us about all the vulnerable areas which are not being fully tested. If we address those areas, most vulnerabilities are resolved. Even after tests are added, if by any chance the test is not treated cleanly or corner cases are missed, GitHub Code Scanning immediately flags those corners. It's always beneficial to have because it's not humanly possible to check all corner case scenarios, but as a system where they diagnose each line item, that's very helpful.
it_user723534 - PeerSpot reviewer
Guitarist at a media company with self employed
It's not easy to get out once you're in
Sitelock may perform a useful service, but be wary of giving them your credit card information. When you sign on for the paid service, Sitelock: * Hides (makes it difficult to find) that they default the auto-renew (you can't sign up without agreeing to have them automatically bill your credit card every year). * Hides (makes it difficult to find) how to stop auto-renew: * You can't just stop auto-renew from your billing panel, the way you can with reputable businesses. * You have to hunt their website for a link (in extremely small font) to the page which contains instructions for cancelling. * When you get to that page, turns out it's the 5000+ word "Terms of Service" document, which you have to scour to find a phone number. Then, you have to call and get put on hold (or if you like, they will call you back three days later). Once you finally get through, you have to jump through a lot of security hoops. All of the above, just to cancel the service. Their product may or may not be OK, but be forewarned that with Sitelock, it's not easy to get out once you're in.
report
Use our free recommendation engine to learn which Static Application Security Testing (SAST) solutions are best for your needs.
881,114 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
11%
Financial Services Firm
10%
Manufacturing Company
9%
Transportation Company
6%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
No data available
 

Questions from the Community

What is your experience regarding pricing and costs for GitHub Code Scanning?
The organization pays for the license of GitHub Code Scanning, but specific price details are unknown.
What needs improvement with GitHub Code Scanning?
In my opinion, areas of GitHub Code Scanning that could be improved include that a few things are not visible to us, such as where it stores data and which path. There is a separate team for that w...
What advice do you have for others considering GitHub Code Scanning?
I am an end user only here with GitHub Code Scanning. I currently might be using the latest version of GitHub Code Scanning, but I don't remember the specific version. I have not utilized the real-...
What do you recommend for a securing Web Application?
That's one of the most critical questions any development team faces! Securing a web application requires a layered approach, not a single tool. Here is a quick breakdown of what to recommend: In...
 

Overview

 

Sample Customers

Information Not Available
galaxyguitar.com, robertasinc.com, indiarunning.com, comprarenpr.com, idbasolutions.com, newgrip.com
Find out what your peers are saying about GitHub Code Scanning vs. SiteLock and other solutions. Updated: December 2025.
881,114 professionals have used our research since 2012.