edera-dev / am-i-isolatedLinks
Validate the isolation posture of your container environment.
☆307Updated this week
Alternatives and similar repositories for am-i-isolated
Users that are interested in am-i-isolated are comparing it to the libraries listed below
Sorting:
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆114Updated last week
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆111Updated 11 months ago
- Supply-Chain Firewall (SCFW) is a tool for preventing the installation of malicious npm and PyPI packages☆210Updated this week
- boostsecurityio/poutine☆350Updated last month
- kntrl is an eBPF based runtime agent that monitors and prevents anomalous behaviour defined by you on your pipeline. kntrl achieves this …☆125Updated 3 months ago
- Inspect certificate authorities in container images☆240Updated 3 weeks ago
- ☆85Updated 2 months ago
- Supporting code and demos for KubeCon EU 2023 talk "Malicious Compliance: Reflections on Trusting Container Image Scanners"☆67Updated 2 years ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆59Updated 11 months ago
- 🧰 Multi Tool Kubernetes Pentest Image☆250Updated 3 months ago
- An open source, cloud-native security to protect everything from build to runtime☆392Updated this week
- YouShallNotPass brings an added level of execution security to mission-critical CI/CD Systems.☆37Updated last year
- #supply #chain #attack #detection☆633Updated last week
- ☆75Updated 2 months ago
- SecObserve is an open source vulnerability and license management system for software development teams and cloud environments. It suppor…☆198Updated last week
- Response Engine for managing threats in your Kubernetes☆186Updated last month
- (D)ocker(F)ile (C)onverter: CLI to convert Dockerfiles to use Chainguard Images and APKs in FROM and RUN lines etc.☆95Updated 3 months ago
- Template Go app repo with local test/lint/build/vulnerability check workflow, and on tag image test/build/release pipelines, with ko gene…☆104Updated last year
- Kubernetes tool for scanning clusters for network policies and identifying unprotected workloads.☆450Updated last month
- Semgrep-based Policy Controller for Kubernetes☆47Updated 8 months ago
- Runtime Security Solution for your CI/CD Pipeline☆112Updated last month
- ☆35Updated 4 months ago
- The security workflow engine!☆135Updated last month
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆60Updated last year
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆40Updated last year
- Outil de sécurité des architectures kubernetes avancées☆57Updated last month
- AWS honey token manager☆89Updated last year
- Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.☆191Updated 3 months ago
- Security tool against dependency typosquatting attacks☆54Updated this week
- Kubernetes audit logging, when you don't control the control plane☆90Updated last week