This repo is a consolidation of Secure Software Supply Chain resources, such as talks, whitepapers, conferences and more.
☆139Jul 12, 2022Updated 3 years ago
Alternatives and similar repositories for SecureSoftwareSupplyChain
Users that are interested in SecureSoftwareSupplyChain are comparing it to the libraries listed below
Sorting:
- A reading list for software supply-chain security.☆365Nov 21, 2022Updated 3 years ago
- Witness is a pluggable framework for software supply chain risk management. It automates, normalizes, and verifies software artifact pro…☆517Updated this week
- Threat matrix for CI/CD Pipeline☆759Jul 8, 2024Updated last year
- A repository of resources discussing the Public Sectors push for Zero Trust along with associated resources for learning on the topic.☆42Mar 2, 2022Updated 4 years ago
- ☆29Jan 31, 2025Updated last year
- Supply Chain Integrity Model☆106Jun 12, 2023Updated 2 years ago
- Enable Falco to read audit logs from EKS☆11Dec 13, 2020Updated 5 years ago
- vexctl is a tool to attest VEX impact statements☆45Mar 27, 2023Updated 2 years ago
- go-ima is a tool that checks if a file has been tampered with. It is useful in ensuring integrity in CI systems☆13Sep 28, 2023Updated 2 years ago
- Systematic Universal Security Testing Orchestration☆37Mar 28, 2022Updated 3 years ago
- Template repository for new images☆25Sep 4, 2023Updated 2 years ago
- This is a POC repository showing how a Kubernetes Admission Controller can be made irrelevant when verifying container image signatures☆12Dec 21, 2022Updated 3 years ago
- apt2sbom python package generates SPDX or CycloneDX files from Ubuntu APT and Python packaging information☆25Feb 4, 2022Updated 4 years ago
- Red team tool that emulates the SolarWinds CI compromise attack vector.☆24Mar 15, 2024Updated last year
- Open Source Software Secure Supply Chain Framework☆239Oct 28, 2022Updated 3 years ago
- This is just a proof-of-concept project that aims to sign and verify container images using cosign and OPA (Open Policy Agent)☆63Aug 4, 2021Updated 4 years ago
- Python's handling of NaN is....interesting?broken?...this project illustrates the issue☆13Dec 28, 2021Updated 4 years ago
- ☆16Apr 30, 2023Updated 2 years ago
- A community collection of security reviews of open source software components.☆97Feb 29, 2024Updated 2 years ago
- A tool to check the security settings of Github Organizations.☆75Feb 9, 2026Updated 3 weeks ago
- Go beyond package manager discovery for SBOM☆18Feb 22, 2022Updated 4 years ago
- ☆23Oct 26, 2021Updated 4 years ago
- 🖇 ️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆76Aug 22, 2024Updated last year
- ☆255Feb 23, 2026Updated last week
- A CVRF CSAF Converter, taking care about OASIS specification.☆10Jun 4, 2025Updated 8 months ago
- WebStor efficiently enumerates all websites across your organization’s networks and those in your DNS records - including cloud-hosted se…☆156Mar 31, 2024Updated last year
- An open-source tool for auditing your software supply chain stack for security compliance based on a new CIS Software Supply Chain benchm…☆769Dec 11, 2024Updated last year
- all paths lead to clouds☆638Oct 11, 2023Updated 2 years ago
- This repo has been replaced by https://www.cloudvulndb.org☆726Jun 29, 2022Updated 3 years ago
- ☆20Feb 5, 2026Updated 3 weeks ago
- Darkfiles finds orphaned files in container images and makes them to bad deeds☆42May 11, 2023Updated 2 years ago
- 🔐CNCF Security Technical Advisory Group -- secure access, policy control, privacy, auditing, explainability and more!☆2,256Dec 8, 2025Updated 2 months ago
- Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).☆144May 1, 2025Updated 10 months ago
- CloudSplaining on AWS Managed Policies☆44Sep 8, 2025Updated 5 months ago
- A tool to automatically build a dependency graph and Software Bill of Materials (SBOM) for packages and arbitrary source code repositorie…☆385Updated this week
- ☆76Dec 10, 2025Updated 2 months ago
- Run compliance and security controls to detect Terraform AWS resources deviating from security best practices prior to deployment using P…☆27Aug 14, 2025Updated 6 months ago
- Container image provenance spec that allows tracing CVEs detected in registry images back to a CVE's source of origin.☆45Oct 30, 2023Updated 2 years ago
- Template Go app repo with local test/lint/build/vulnerability check workflow, and on tag image test/build/release pipelines, with ko gene…☆103Apr 23, 2024Updated last year