deislabs / image-layer-provenanceLinks
Container image provenance spec that allows tracing CVEs detected in registry images back to a CVE's source of origin.
☆44Updated 2 years ago
Alternatives and similar repositories for image-layer-provenance
Users that are interested in image-layer-provenance are comparing it to the libraries listed below
Sorting:
- A highly configurable build executor and observer designed to generate signed SLSA provenance attestations about build runs.☆69Updated this week
- Transparenty Immutable Container Image Tags☆20Updated 2 years ago
- 🔍 Rekor transparency log monitoring and alerting☆27Updated 2 years ago
- ☆58Updated 3 years ago
- Trivy plugin for OCI referrers☆23Updated last year
- ☆20Updated 6 months ago
- sigstore installation walkthrough, local☆62Updated last year
- Stuff to make standing up sigstore (esp. for testing) easier for e2e/integration testing.☆68Updated this week
- Trust Dexter to ensure that all your images are pinned by digest for better security☆31Updated 2 years ago
- Example repository that demonstrates a supply chain security workflow using Syft, Grype, Cosign☆12Updated 4 years ago
- Keyless Git signing with cosign!☆11Updated 3 years ago
- Integrates Spiffe and Vault to have secretless authentication☆95Updated last week
- To manage Docker Content Trust and Notary certificates☆13Updated last week
- Dynamic GitHub Actions from Wolfi packages☆44Updated 6 months ago
- ☆29Updated last year
- kubectl plugin for signing Kubernetes manifest YAML files with sigstore☆85Updated last week
- Sigstore user stories☆30Updated 2 years ago
- A Go implementation of in-toto. in-toto is a framework to protect software supply chain integrity.☆141Updated this week
- Helm charts for sigstore project☆83Updated this week
- Tooling and library for generation, validation and verification of supply chain metadata documents and frameworks☆33Updated 7 months ago
- This tool allows using a SPIFFE JWT to authenticate to AWS APIs☆34Updated last week
- Build and deploy Go applications with Terraform☆29Updated last week
- Example goreleaser + github actions config with keyless signing, SBOM generation, and attestations☆58Updated last week
- ☆23Updated 2 years ago
- Generate K8s RBAC policies based on e2e test runs☆28Updated 4 years ago
- Archivista is a graph and storage service for in-toto attestations. Archivista enables the discovery and retrieval of attestations for so…☆103Updated this week
- ☆35Updated 4 years ago
- Write controller-runtime based k8s controllers that read/write to git, not k8s☆48Updated 4 years ago
- GitHub actions for the chainguard-images☆22Updated this week
- ☆16Updated 3 months ago