aquasecurity / harbor-scanner-trivy
Use Trivy as a plug-in vulnerability scanner in the Harbor registry
☆221Updated 6 months ago
Alternatives and similar repositories for harbor-scanner-trivy:
Users that are interested in harbor-scanner-trivy are comparing it to the libraries listed below
- This project scans and assesses workloads in Kubernetes at runtime. It can apply protection rules to workloads to avoid further risks as …☆101Updated 10 months ago
- ☆252Updated this week
- HELM chart to install NeuVector container cluster☆125Updated this week
- Static Analysis Library for Containers☆198Updated last year
- Harbor community-related material☆77Updated 2 weeks ago
- A simple WebUI with latest events from Falco☆118Updated last week
- ☆21Updated this week
- Catalogue all images of a Kubernetes cluster to multiple targets with Syft☆198Updated last week
- Harbor Scanner Adapter for Anchore Engine and Enterprise☆37Updated last week
- Community managed Helm charts for running Falco with Kubernetes☆255Updated this week
- Kubernetes Pod Security Standards implementation - https://github.com/kubernetes/enhancements/blob/master/keps/sig-auth/2579-psp-replacem…☆99Updated this week
- Sidecar for managing OPA instances in Kubernetes.☆241Updated last week
- Use Clair as a plug-in vulnerability scanner in the Harbor registry☆35Updated 8 months ago
- Checks whether Docker is deployed according to security best practices as defined in the CIS Docker Benchmark☆215Updated last month
- Kubernetes operator for installing Calico and Calico Enterprise☆190Updated this week
- Prometheus Metrics Exporter for Falco output events☆121Updated last week
- The regolibrary package contains the controls Kubescape uses for detecting misconfigurations in Kubernetes manifests.☆123Updated 2 weeks ago
- Manage admission policies in your Kubernetes cluster with ease☆206Updated last week
- ☆1,167Updated this week
- Tool for synchronizing Helm Chart repositories.☆192Updated last week
- kube-scan: Octarine k8s cluster risk assessment tool☆802Updated 2 years ago
- Process documentation, non-code deliverables, and miscellaneous artifacts of Kubernetes SIG Security☆196Updated 2 weeks ago
- Response Engine for managing threats in your Kubernetes☆150Updated this week
- Sigstore Policy Controller - an admission controller that can be used to enforce policy on a Kubernetes cluster based on verifiable supp…☆128Updated last week
- foundation modules for scanning container packages and reporting vulnerabilities☆144Updated this week
- KubeEye aims to find various problems on Kubernetes, such as application misconfiguration, unhealthy cluster components and node problems…☆824Updated 2 months ago
- Create Kubernetes AdmissionReview requests from Kubernetes resource manifests☆115Updated last week
- Simple scripts to benchmark kubernetes cluster features☆208Updated 2 years ago
- Store and access your secrets the Kubernetes native way with any external KMS.☆176Updated last year
- Use Snyk to find and fix vulnerabilities in your Kubernetes workloads☆88Updated this week