SAP / risk-explorer-for-software-supply-chains
A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and other resources. The taxonomy as well as related safeguards can be explored using an interactive visualization tool.
☆75Updated last month
Alternatives and similar repositories for risk-explorer-for-software-supply-chains:
Users that are interested in risk-explorer-for-software-supply-chains are comparing it to the libraries listed below
- A fork of Bandit tool with patterns to identifying malicious python code.☆25Updated 2 years ago
- Home page of project "KB"☆123Updated 3 weeks ago
- A place to systematically store software bill of materials (SBOM) documents.☆46Updated last year
- A dataset of software supply chain compromises. Please help us maintain it!☆128Updated 2 years ago
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebas…☆142Updated last year
- Feed parsing for language package manager updates☆78Updated 4 months ago
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆200Updated this week
- Sharing software supply chain security open source projects☆49Updated 2 years ago
- VFCFinder: Searching for the Missing Vulnerability Fixing Commits☆27Updated last year
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆132Updated last year
- This repository contains a list of papers about software supply chain☆27Updated 11 months ago
- The Cloud Property Graph is based on a Code Property Graph and tries to connect static code analysis and Cloud runtime assessment.☆24Updated 3 months ago
- A community collection of security reviews of open source software components.☆93Updated last year
- A repository of reports of malicious packages identified in Open Source package repositories, consumable via the Open Source Vulnerabilit…☆304Updated this week
- Code Hierarchy Exploration Net (chen)☆20Updated this week
- Artifact accompanying our ICSE '22 paper "Practical Automated Detection of Malicious npm Packages"☆43Updated 3 years ago
- ☆44Updated 9 months ago
- The repository has collected about 10,000 malicious pypi packages. This dataset is the work of the ASE 2023 paper "An Empirical Study of…☆86Updated 2 weeks ago
- Evaluation Framework for Dependency Analysis (EFDA)☆43Updated 2 years ago
- A compilation of resources in the software supply chain security domain, with emphasis on open source☆315Updated 2 years ago
- Macaron is an extensible supply-chain security analysis framework from Oracle Labs that supports a wide range of build systems and CI/CD …☆153Updated this week
- Atom is a novel intermediate representation for applications and a standalone tool that is powered by chen.☆64Updated this week
- ☆31Updated 6 months ago
- Open Source Vulnerability schema.☆198Updated 2 weeks ago
- The Artifacts for ICSE 2023 paper: Bad Snakes: Understanding and Improving Python Package Index Malware Scanning☆11Updated 2 years ago
- Tool for collecting vulnerability data from various sources (used to build the grype database)☆93Updated last week
- ☆26Updated last year
- Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages☆133Updated 2 years ago
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆92Updated 2 months ago
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.1, purl, and vers…☆114Updated last week