cbomkit / sonar-cryptographyLinks
This repository contains a SonarQube Plugin that detects cryptographic assets in source code and generates CBOM.
☆54Updated this week
Alternatives and similar repositories for sonar-cryptography
Users that are interested in sonar-cryptography are comparing it to the libraries listed below
Sorting:
- A toolset for dealing with Cryptography Bill of Materials (CBOM)☆75Updated last week
- A standard API specification for exchanging supply chain artifacts and intelligence☆97Updated last week
- Utility that provides an API platform for validating, querying and managing BOM data☆124Updated last month
- Software Component Verification Standard (SCVS)☆153Updated 10 months ago
- A repository with examples of CycloneDX BOMs (SBOM, SaaSBOM, OBOM, VEX, etc)☆215Updated 3 months ago
- ☆138Updated this week
- Cryptography Bill of Materials☆97Updated 4 months ago
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆52Updated 2 months ago
- ☆25Updated 2 years ago
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆139Updated 2 years ago
- ☆102Updated last year
- A tool for detecting cryptographic assets in container images and directories, and generating CBOMs.☆27Updated last week
- sbomqs: The Comprehensive SBOM Quality & Compliance Tool☆267Updated this week
- Working Group on Artificial Intelligence and Machine Learning (AI/ML) Security☆141Updated last month
- Core model including reused documentation☆101Updated last month
- The S2C2F Project is a group working within the OpenSSF's Supply Chain Integrity Working Group formed to further develop and continuously…☆223Updated 8 months ago
- The security workflow engine!☆136Updated 2 months ago
- Repository for on-going work as part of the SBOM for AI Tiger Team effort.☆40Updated 6 months ago
- An extensive list of resources related to threat modelling. Gotta catch ’em all!☆40Updated last month
- Global Cyber Policy Working Group☆100Updated 2 months ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆179Updated last month
- Enrich SBOMs with data from third party services☆214Updated last week
- A compilation of resources in the software supply chain security domain, with emphasis on open source☆344Updated 2 years ago
- Generate a score for your sbom to understand if it will actually be useful.☆237Updated last year
- NextJS-based single-page application for completing and reviewing SAMM assessments☆79Updated 2 years ago
- SecObserve is an open source vulnerability and license management system for software development teams and cloud environments. It suppor…☆217Updated this week
- ☆48Updated this week
- The OpenSSF Vulnerability Disclosures Working Group seeks to help improve the overall security of the open source software ecosystem by h…☆210Updated this week
- PURL to CPE Relationship mapping project.☆110Updated this week
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆68Updated 7 months ago