deislabs / image-layer-provenanceLinks
Container image provenance spec that allows tracing CVEs detected in registry images back to a CVE's source of origin.
ā43Updated last year
Alternatives and similar repositories for image-layer-provenance
Users that are interested in image-layer-provenance are comparing it to the libraries listed below
Sorting:
- A highly configurable build executor and observer designed to generate signed SLSA provenance attestations about build runs.ā63Updated this week
- š Rekor transparency log monitoring and alertingā27Updated last year
- ā20Updated last month
- Stuff to make standing up sigstore (esp. for testing) easier for e2e/integration testing.ā66Updated last week
- Integrates Spiffe and Vault to have secretless authenticationā90Updated last week
- ā57Updated 3 years ago
- Transparenty Immutable Container Image Tagsā20Updated 2 years ago
- A CLI used to work with the Wolfi OSS projectā63Updated this week
- Example goreleaser + github actions config with keyless signing, SBOM generation, and attestationsā58Updated last week
- Sigstore user storiesā30Updated last year
- Helm charts for sigstore projectā77Updated this week
- To manage Docker Content Trust and Notary certificatesā13Updated last week
- A curated list of awesome CNAB (Cloud Native Applications Bundles) | https://cnab.io/ā16Updated 4 years ago
- Trust Dexter to ensure that all your images are pinned by digest for better securityā29Updated last year
- sigstore installation walkthrough, localā61Updated last year
- This tool allows using a SPIFFE JWT to authenticate to AWS APIsā34Updated 2 weeks ago
- ā23Updated 2 years ago
- Trivy plugin for OCI referrersā23Updated last year
- kubectl plugin for signing Kubernetes manifest YAML files with sigstoreā84Updated last month
- Go implementation for CNAB content trust verification using TUF, Notary, and in-totoā31Updated 2 years ago
- Anchore Kubernetes Inventory can poll Kubernetes Cluster API(s) to tell Anchore Enterprise which Containers and Images are currently in-uā¦ā66Updated last week
- Service implementation for a Kubernetes Dynamic Webhook controller for interacting with Anchoreā65Updated 2 weeks ago
- A Go implementation of in-toto. in-toto is a framework to protect software supply chain integrity.ā139Updated 2 weeks ago
- A lightweight API for maintaining a list of Kubernetes clusters and associated metadata.ā27Updated this week
- native go library for installation and management of apk packagesā29Updated last year
- Build and deploy Go applications with Terraformā29Updated this week
- Example repository that demonstrates a supply chain security workflow using Syft, Grype, Cosignā11Updated 3 years ago
- Diagrams to visually learn Falco and its eBPF probeā14Updated 4 years ago
- Tooling and library for generation, validation and verification of supply chain metadata documents and frameworksā32Updated 2 months ago
- Enabling Software Supply Chain Security Capabilities in ArgoCDā87Updated 2 years ago