DinoChiesa / get-gcp-access-tokenLinks
☆15Updated 11 months ago
Alternatives and similar repositories for get-gcp-access-token
Users that are interested in get-gcp-access-token are comparing it to the libraries listed below
Sorting:
- Script to score images against CHPs criteria☆31Updated this week
- ☆55Updated 3 weeks ago
- All-in-one auditing toolkit for identifying common security issues in managed Kubernetes environments. Currently supports Amazon EKS.☆351Updated 2 months ago
- Software Supply Chain Security Platform☆343Updated this week
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆40Updated 10 months ago
- Process documentation, non-code deliverables, and miscellaneous artifacts of Kubernetes SIG Security☆210Updated last month
- BadRobot - Operator Security Audit Tool☆221Updated this week
- ☆46Updated this week
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆107Updated 6 months ago
- Exports primitive and predefined GCP IAM Roles and their permissions☆109Updated this week
- Witness is a pluggable framework for software supply chain risk management. It automates, normalizes, and verifies software artifact pro…☆489Updated 2 weeks ago
- Supporting code and demos for KubeCon EU 2023 talk "Malicious Compliance: Reflections on Trusting Container Image Scanners"☆67Updated last year
- Kubernetes audit logging, when you don't control the control plane☆82Updated this week
- KBOM - Kubernetes Bill of Materials☆317Updated 4 months ago
- Kubernetes Stranger Danger☆63Updated last week
- (d)ocker(f)ile (c)onverter: CLI to convert Dockerfiles to use Chainguard Images and APKs in FROM and RUN lines etc.☆79Updated 3 weeks ago
- TODO: Funny pun about visibility☆217Updated this week
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆110Updated this week
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆58Updated last year
- A tool for preventing the installation of malicious npm and PyPI packages☆152Updated last week
- Compares and analyzes GCP IAM roles.☆77Updated 4 months ago
- A list of cloud security tools and vendors.☆172Updated 10 months ago
- debug IAM roles for service accounts☆65Updated this week
- A tool to create, transform and attest VEX metadata☆148Updated this week
- Using ImpersonatedCredentials for Google Cloud API and id_tokens☆15Updated 2 years ago
- Archivista is a graph and storage service for in-toto attestations. Archivista enables the discovery and retrieval of attestations for so…☆98Updated this week
- The security workflow engine!☆118Updated this week
- ☆30Updated 8 months ago
- Evaluate source control (GitHub) security posture☆250Updated 2 years ago
- Terrascan GitHub action. Scan infrastructure as code including Terraform, Kubernetes, Helm, and Kustomize file for security best practice…☆61Updated 7 months ago