deislabs / image-layer-provenanceLinks
Container image provenance spec that allows tracing CVEs detected in registry images back to a CVE's source of origin.
☆43Updated last year
Alternatives and similar repositories for image-layer-provenance
Users that are interested in image-layer-provenance are comparing it to the libraries listed below
Sorting:
- A highly configurable build executor and observer designed to generate signed SLSA provenance attestations about build runs.☆65Updated this week
- ☆20Updated 4 months ago
- 🔍 Rekor transparency log monitoring and alerting☆27Updated 2 years ago
- ☆57Updated 3 years ago
- Transparenty Immutable Container Image Tags☆20Updated 2 years ago
- Example repository that demonstrates a supply chain security workflow using Syft, Grype, Cosign☆12Updated 4 years ago
- sigstore installation walkthrough, local☆63Updated last year
- Stuff to make standing up sigstore (esp. for testing) easier for e2e/integration testing.☆68Updated last week
- ☆23Updated 2 years ago
- kubectl plugin for signing Kubernetes manifest YAML files with sigstore☆85Updated last month
- Build and deploy Go applications with Terraform☆29Updated last week
- Trivy plugin for OCI referrers☆23Updated last year
- Keyless Git signing with cosign!☆11Updated 3 years ago
- Integrates Spiffe and Vault to have secretless authentication☆92Updated 2 weeks ago
- A CLI used to work with the Wolfi OSS project☆67Updated this week
- Trust Dexter to ensure that all your images are pinned by digest for better security☆30Updated last year
- ☆29Updated last year
- Sigstore Policy Controller - an admission controller that can be used to enforce policy on a Kubernetes cluster based on verifiable supp…☆147Updated 2 weeks ago
- Helm charts for sigstore project☆83Updated last week
- Sigstore user stories☆30Updated 2 years ago
- This tool allows using a SPIFFE JWT to authenticate to AWS APIs☆34Updated 3 months ago
- A Go implementation of in-toto. in-toto is a framework to protect software supply chain integrity.☆142Updated 2 weeks ago
- Example goreleaser + github actions config with keyless signing, SBOM generation, and attestations☆58Updated this week
- Scans SBOMs for vulnerabilities with Grype☆85Updated last week
- ☆22Updated last week
- Anchore Kubernetes Inventory can poll Kubernetes Cluster API(s) to tell Anchore Enterprise which Containers and Images are currently in-u…☆67Updated this week
- Dynamic GitHub Actions from Wolfi packages☆44Updated 5 months ago
- GitHub actions for the chainguard-images☆20Updated last week
- native go library for installation and management of apk packages☆30Updated last year
- ☆15Updated last month