CycodeLabs / cimon-actionLinks
Runtime Security Solution for your CI/CD Pipeline
☆112Updated last month
Alternatives and similar repositories for cimon-action
Users that are interested in cimon-action are comparing it to the libraries listed below
Sorting:
- kntrl is an eBPF based runtime agent that monitors and prevents anomalous behaviour defined by you on your pipeline. kntrl achieves this …☆125Updated 3 months ago
- Template Go app repo with local test/lint/build/vulnerability check workflow, and on tag image test/build/release pipelines, with ko gene…☆104Updated last year
- The security workflow engine!☆136Updated last month
- A tool to check the security settings of Github Organizations.☆75Updated 2 years ago
- Supply-Chain Firewall (SCFW) is a tool for preventing the installation of malicious npm and PyPI packages☆210Updated this week
- A tool to create, transform and attest VEX metadata☆170Updated this week
- Format agnostic SBOM tooling☆130Updated last month
- Generate a score for your sbom to understand if it will actually be useful.☆236Updated last year
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆114Updated this week
- OpenVEX Specification☆163Updated 7 months ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆111Updated last year
- ☆75Updated 2 months ago
- Tool for collecting vulnerability data from various sources (used to build the grype database)☆109Updated this week
- Enrich SBOMs with data from third party services☆209Updated 3 weeks ago
- boostsecurityio/poutine☆354Updated this week
- This repo. is archived. The utility is now at: https://github.com/CycloneDX/sbom-utility☆60Updated 2 years ago
- An SBOM query language and associated utilities☆55Updated last year
- Scan GitHub Actions Workflow logs for IOCs☆16Updated 3 weeks ago
- Audit your GitHub Actions workflow runs to see exactly which Actions were downloaded☆79Updated 2 weeks ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆88Updated last year
- ☆85Updated this week
- A repository of reports of malicious packages identified in Open Source package repositories, consumable via the Open Source Vulnerabilit…☆432Updated this week
- A GitHub App that acts like a Security Token Service (STS) for the Github API☆292Updated this week
- SBOM Move - Automate build and transfer of SBOMs across systems☆25Updated last week
- Supporting code and demos for KubeCon EU 2023 talk "Malicious Compliance: Reflections on Trusting Container Image Scanners"☆67Updated 2 years ago
- ☆115Updated 4 months ago
- A standard API specification for exchanging supply chain artifacts and intelligence☆95Updated 3 weeks ago
- Kubernetes audit logging, when you don't control the control plane☆90Updated last week
- Compare data from multiple vulnerability scanners to get a more complete picture of potential exposures.☆78Updated 2 years ago
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆139Updated last year