chainguard-dev / image-comparisonLinks
Comparison of Chainguard Images to others
☆20Updated this week
Alternatives and similar repositories for image-comparison
Users that are interested in image-comparison are comparing it to the libraries listed below
Sorting:
- Sigstore user stories☆30Updated 2 years ago
- To manage Docker Content Trust and Notary certificates☆13Updated last week
- ☆23Updated 2 years ago
- Container image provenance spec that allows tracing CVEs detected in registry images back to a CVE's source of origin.☆44Updated 2 years ago
- SLSA level 3 action☆11Updated last year
- Transparenty Immutable Container Image Tags☆20Updated 2 years ago
- Terraform provider to perform OCI image operations☆14Updated last week
- This tool allows using a SPIFFE JWT to authenticate to AWS APIs☆34Updated last week
- Example goreleaser + github actions config with keyless signing, SBOM generation, and attestations☆58Updated last week
- Trivy plugin for OCI referrers☆23Updated last year
- Kubernetes Admission Controller for Image Scanning using OPA☆50Updated 2 years ago
- Kubernetes Controller for managing Github☆39Updated 2 years ago
- ☆35Updated 4 years ago
- The home for CloudNative.tv the definitive interactive media experience for learning and growing in cloud native☆37Updated 4 years ago
- A High-Availability distribution of Knative.☆20Updated last year
- ☆29Updated last year
- GitHub actions for the chainguard-images☆22Updated this week
- Funding requests for project infrastructure, events, and consulting.☆18Updated 2 years ago
- Service implementation for a Kubernetes Dynamic Webhook controller for interacting with Anchore☆65Updated last week
- A highly configurable build executor and observer designed to generate signed SLSA provenance attestations about build runs.☆68Updated last week
- Darkfiles finds orphaned files in container images and makes them to bad deeds☆42Updated 2 years ago
- ☆20Updated 5 months ago
- Generate K8s RBAC policies based on e2e test runs☆28Updated 4 years ago
- Example repository that demonstrates a supply chain security workflow using Syft, Grype, Cosign☆12Updated 4 years ago
- A simple tool for converting Rego (OPA) rule into command.☆31Updated 3 years ago
- cloud native software supply chain ☁️🔗☆64Updated 4 years ago
- ☆15Updated 2 years ago
- ⭕️Snooping on the Kubernetes OpenAPI communications☆97Updated last week
- Build and deploy Go applications with Terraform☆29Updated last week
- native go library for installation and management of apk packages☆30Updated last year