edera-dev / am-i-isolatedLinks
Validate the isolation posture of your container environment.
☆298Updated last month
Alternatives and similar repositories for am-i-isolated
Users that are interested in am-i-isolated are comparing it to the libraries listed below
Sorting:
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆110Updated 3 weeks ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆109Updated 8 months ago
- A tool for preventing the installation of malicious npm and PyPI packages☆160Updated last week
- boostsecurityio/poutine☆320Updated 2 weeks ago
- ☆83Updated 2 months ago
- kntrl is an eBPF based runtime agent that monitors and prevents anomalous behaviour defined by you on your pipeline. kntrl achieves this …☆116Updated 4 months ago
- Inspect certificate authorities in container images☆236Updated last week
- Supporting code and demos for KubeCon EU 2023 talk "Malicious Compliance: Reflections on Trusting Container Image Scanners"☆67Updated last year
- This repository contains the container image scanning tool ORCA☆41Updated 2 weeks ago
- Kubernetes tool for scanning clusters for network policies and identifying unprotected workloads.☆445Updated last week
- SecObserve is an open source vulnerability and license management system for software development teams and cloud environments. It suppor…☆178Updated this week
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆40Updated last year
- Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.☆189Updated this week
- Response Engine for managing threats in your Kubernetes☆170Updated last week
- #supply #chain #attack #detection☆550Updated this week
- 🧰 Multi Tool Kubernetes Pentest Image☆246Updated 2 weeks ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆56Updated 7 months ago
- (D)ocker(F)ile (C)onverter: CLI to convert Dockerfiles to use Chainguard Images and APKs in FROM and RUN lines etc.☆89Updated 3 weeks ago
- Witness is a pluggable framework for software supply chain risk management. It automates, normalizes, and verifies software artifact pro…☆495Updated this week
- YouShallNotPass brings an added level of execution security to mission-critical CI/CD Systems.☆36Updated last year
- RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs and…☆153Updated 9 months ago
- ☆180Updated 4 months ago
- A simple mitmproxy blueprint to intercept HTTPS traffic from app running on Kubernetes☆72Updated 5 months ago
- ☆72Updated last month
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆299Updated last month
- Template Go app repo with local test/lint/build/vulnerability check workflow, and on tag image test/build/release pipelines, with ko gene…☆104Updated last year
- A tool to create, transform and attest VEX metadata☆155Updated this week
- Kubernetes audit logging, when you don't control the control plane☆85Updated last week
- The security workflow engine!☆119Updated this week
- ☆83Updated 7 months ago