SAP / risk-explorer-for-software-supply-chainsLinks
A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and other resources. The taxonomy as well as related safeguards can be explored using an interactive visualization tool.
☆79Updated last month
Alternatives and similar repositories for risk-explorer-for-software-supply-chains
Users that are interested in risk-explorer-for-software-supply-chains are comparing it to the libraries listed below
Sorting:
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebas…☆157Updated last year
- A dataset of software supply chain compromises. Please help us maintain it!☆130Updated 3 years ago
- Home page of project "KB"☆131Updated 9 months ago
- A fork of Bandit tool with patterns to identifying malicious python code.☆28Updated 3 years ago
- A place to systematically store software bill of materials (SBOM) documents.☆49Updated 2 years ago
- A community collection of security reviews of open source software components.☆96Updated last year
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆286Updated last week
- Feed parsing for language package manager updates☆80Updated last year
- A repository of reports of malicious packages identified in Open Source package repositories, consumable via the Open Source Vulnerabilit…☆426Updated last week
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.2, purl, and vers…☆133Updated last week
- VFCFinder: Searching for the Missing Vulnerability Fixing Commits☆30Updated 2 years ago
- A compilation of resources in the software supply chain security domain, with emphasis on open source☆338Updated 2 years ago
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆139Updated last year
- atom is a novel intermediate representation for applications and a standalone tool that is powered by chen.☆78Updated this week
- Open Source Vulnerability schema.☆221Updated this week
- ☆52Updated last year
- The Cloud Property Graph is based on a Code Property Graph and tries to connect static code analysis and Cloud runtime assessment.☆28Updated 11 months ago
- Sharing software supply chain security open source projects☆53Updated 3 years ago
- The OpenSSF Vulnerability Disclosures Working Group seeks to help improve the overall security of the open source software ecosystem by h…☆204Updated 2 months ago
- PURL to CPE Relationship mapping project.☆106Updated this week
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆96Updated 10 months ago
- A tool to automatically build a dependency graph and Software Bill of Materials (SBOM) for packages and arbitrary source code repositorie…☆378Updated last week
- Data about all known supply-chain attacks through history☆63Updated 7 months ago
- ☆27Updated 2 years ago
- Low-effort reachability analysis for third-party code vulnerabilities.☆22Updated 2 years ago
- OSS-Fuzz vulnerabilities for OSV.☆167Updated this week
- Collection of tools for analyzing open source packages.☆354Updated 2 weeks ago
- The official repository of ICSME'23 paper "Exploring Security Commits in Python"☆18Updated 2 years ago
- A repository with examples of CycloneDX BOMs (SBOM, SaaSBOM, OBOM, VEX, etc)☆212Updated 2 months ago
- A standard API specification for exchanging supply chain artifacts and intelligence☆95Updated last week