aquasecurity / chain-benchView external linksLinks
An open-source tool for auditing your software supply chain stack for security compliance based on a new CIS Software Supply Chain benchmark.
☆767Dec 11, 2024Updated last year
Alternatives and similar repositories for chain-bench
Users that are interested in chain-bench are comparing it to the libraries listed below
Sorting:
- ☆20Nov 24, 2022Updated 3 years ago
- Witness is a pluggable framework for software supply chain risk management. It automates, normalizes, and verifies software artifact pro…☆514Updated this week
- Generate a score for your sbom to understand if it will actually be useful.☆237Aug 13, 2024Updated last year
- A reading list for software supply-chain security.☆366Nov 21, 2022Updated 3 years ago
- Detect and remediate misconfigurations and security risks across all your GitHub and GitLab assets☆829Mar 28, 2025Updated 10 months ago
- Security configuration checks for popular cloud native applications and infrastructure.☆119Feb 16, 2022Updated 3 years ago
- ☆422Jan 18, 2023Updated 3 years ago
- Scans Software Bill of Materials (SBOMs) for security vulnerabilities☆597Mar 31, 2025Updated 10 months ago
- Keyless Git signing using Sigstore☆1,057Updated this week
- Linux Runtime Security and Forensics using eBPF☆4,362Updated this week
- GUAC aggregates software security metadata into a high fidelity graph database.☆1,446Updated this week
- Cloud Security Posture Management (CSPM)☆3,694Dec 4, 2025Updated 2 months ago
- in-toto is a framework to protect supply chain integrity.☆972Feb 3, 2026Updated last week
- ☆16Sep 4, 2025Updated 5 months ago
- Compares and analyzes GCP IAM roles.☆78Mar 9, 2025Updated 11 months ago
- OWASP Foundation Web Respository☆601Nov 24, 2025Updated 2 months ago
- Crowdsourced list of sensitive IAM Actions☆159Oct 29, 2024Updated last year
- Granular, Actionable Adversary Emulation for the Cloud☆2,252Feb 6, 2026Updated last week
- A simple tool for converting Rego (OPA) rule into command.☆30Jun 1, 2022Updated 3 years ago
- Automating situational awareness for cloud penetration tests.☆2,289Feb 5, 2026Updated last week
- Open source compliance tool for development platforms.☆285Oct 30, 2023Updated 2 years ago
- IAM-Deescalate helps mitigate privilege escalation risk in AWS identity and access management (IAM)☆98Sep 14, 2022Updated 3 years ago
- Code signing and transparency for containers and binaries☆5,633Feb 4, 2026Updated last week
- Evaluate source control (GitHub) security posture☆251Mar 8, 2023Updated 2 years ago
- OpenSSF Scorecard - Security health metrics for Open Source☆5,262Feb 6, 2026Updated last week
- CLI tool and library for generating a Software Bill of Materials from container images and filesystems☆8,362Updated this week
- Tfsec is now part of Trivy☆6,952Nov 10, 2025Updated 3 months ago
- Supply-chain Levels for Software Artifacts☆1,809Updated this week
- Notice: Postee is no longer under active development or maintenance.☆206Jan 22, 2026Updated 3 weeks ago
- OpenClarity is an open source platform built to enhance security and observability of cloud native applications and infrastructure☆1,449Updated this week
- Evaluate the RBAC permissions of Kubernetes identities through policies written in Rego☆351Mar 21, 2025Updated 10 months ago
- Detect compliance and security violations across Infrastructure as Code to mitigate risk before provisioning cloud native infrastructure.☆5,206Nov 20, 2025Updated 2 months ago
- A curated list of awesome Kubernetes security resources☆954Dec 15, 2023Updated 2 years ago
- A curated list of OPA related tools, frameworks and articles☆861Jan 16, 2026Updated 3 weeks ago
- Open Source Cloud Native Application Protection Platform (CNAPP)☆5,233Jan 8, 2026Updated last month
- vexctl is a tool to attest VEX impact statements☆45Mar 27, 2023Updated 2 years ago
- Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more☆31,602Updated this week
- Language-agnostic SLSA provenance generation for Github Actions☆545Oct 20, 2025Updated 3 months ago
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆339Updated this week