devops-kung-fu / trustier
Takes a software bill of materials and outputs provenance, and activity data from trustypkg.dev
☆11Updated 7 months ago
Alternatives and similar repositories for trustier:
Users that are interested in trustier are comparing it to the libraries listed below
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆133Updated last year
- Semgrep-based Policy Controller for Kubernetes☆47Updated last month
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆54Updated 3 months ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Updated last year
- ☆21Updated 5 months ago
- A standard API specification for exchanging supply chain artifacts and intelligence☆80Updated this week
- Example repository for GitHub Actions Time of Check to Time of Use (TOCTOU vulnerabilities)☆23Updated last week
- ☆72Updated this week
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61Updated last year
- Clean accounts over permissions in GCP infra at scale☆71Updated 2 years ago
- A CLI that scans for sensitive data in source code☆14Updated 2 years ago
- HashiCorp-relevant rules for the Semgrep code analysis tool☆41Updated last year
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆26Updated last week
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆84Updated 4 months ago
- Security tool against dependency typosquatting attacks☆39Updated this week
- 🧪 Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.☆39Updated 4 months ago
- Automate vulnerability triage which prioritizes remediation over discovery☆17Updated last week
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆93Updated 2 months ago
- A security tool designed to help review merged code changes to open source maintained repositories via LLM assisted review to safeguard a…☆30Updated 6 months ago
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated 2 years ago
- boostsecurityio/lotp☆124Updated 3 weeks ago
- ☆25Updated last year
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆22Updated 2 months ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆31Updated 6 months ago
- AI featured threat modeling and security review action☆43Updated 5 months ago
- A community collection of security reviews of open source software components.☆93Updated last year
- The security workflow engine!☆111Updated this week
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆39Updated 8 months ago
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆108Updated this week
- ☆47Updated this week