devops-kung-fu / trustierLinks
Takes a software bill of materials and outputs provenance, and activity data from trustypkg.dev
☆11Updated 5 months ago
Alternatives and similar repositories for trustier
Users that are interested in trustier are comparing it to the libraries listed below
Sorting:
- A standard API specification for exchanging supply chain artifacts and intelligence☆88Updated 3 weeks ago
- kntrl is an eBPF based runtime agent that monitors and prevents anomalous behaviour defined by you on your pipeline. kntrl achieves this …☆120Updated last month
- The security workflow engine!☆125Updated 2 weeks ago
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆112Updated 2 weeks ago
- Supply-Chain Firewall (SCFW) is a tool for preventing the installation of malicious npm and PyPI packages☆171Updated this week
- ☆37Updated 6 months ago
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆138Updated last year
- boostsecurityio/poutine☆341Updated last week
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆177Updated 11 months ago
- Format agnostic SBOM tooling☆118Updated last week
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆40Updated last year
- Scan GitHub Actions Workflow logs for IOCs☆15Updated 3 weeks ago
- A tool to check the security settings of Github Organizations.☆72Updated 2 years ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61Updated 2 years ago
- A tool to create, transform and attest VEX metadata☆161Updated last week
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆111Updated 9 months ago
- ☆93Updated 9 months ago
- Enrich SBOMs with data from third party services☆196Updated 2 months ago
- ☆114Updated 2 months ago
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆43Updated 3 weeks ago
- Generate a score for your sbom to understand if it will actually be useful.☆234Updated last year
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆60Updated last year
- App that simplifies building decision trees to model adverse scenarios☆219Updated last year
- Script to audit GitHub Action Workflow files for potential vulnerabilities.☆156Updated last year
- Compares and analyzes GCP IAM roles.☆77Updated 7 months ago
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆96Updated 8 months ago
- Supporting code and demos for KubeCon EU 2023 talk "Malicious Compliance: Reflections on Trusting Container Image Scanners"☆67Updated last year
- Pentester-focused Docker registry tool to enumerate and pull images☆35Updated 2 weeks ago
- ☆56Updated last month
- A security tool designed to help review merged code changes to open source maintained repositories via LLM assisted review to safeguard a…☆31Updated last year