evryfs / sbom-dependency-submission-actionView external linksLinks
Submit SBOMs to GitHub's dependency submission API
☆18Dec 4, 2025Updated 2 months ago
Alternatives and similar repositories for sbom-dependency-submission-action
Users that are interested in sbom-dependency-submission-action are comparing it to the libraries listed below
Sorting:
- fatt tries to find any purl in your project by looking at predefined fields in the supported packages. These fields describe using a purl…☆11Jan 26, 2026Updated 2 weeks ago
- Example repository that demonstrates a supply chain security workflow using Syft, Grype, Cosign☆12Sep 15, 2021Updated 4 years ago
- Github Action implementation of SLSA Provenance Generation☆50Updated this week
- go-ima is a tool that checks if a file has been tampered with. It is useful in ensuring integrity in CI systems☆13Sep 28, 2023Updated 2 years ago
- SLSA level 3 action☆11Apr 26, 2024Updated last year
- Kubernetes tools in a "distroless" container☆13Oct 30, 2023Updated 2 years ago
- ☆11Nov 11, 2022Updated 3 years ago
- Demo app duplicated in 5 languages (Go/JavaScript/Python/Ruby/Rust) showing how to go from source code to container image using melange+a…☆37Dec 24, 2023Updated 2 years ago
- my goreleaser.yml files☆13Feb 5, 2026Updated last week
- Comparison of Chainguard Images to others☆21Feb 9, 2026Updated last week
- To manage Docker Content Trust and Notary certificates☆13Updated this week
- Example goreleaser + github actions config with keyless signing, SBOM generation, and attestations☆58Updated this week
- ☆58Jun 1, 2022Updated 3 years ago
- Simplify Kubernetes Secrets Management with Dockhand Secrets Operator☆18Nov 24, 2025Updated 2 months ago
- Docker CI scripts☆12Nov 24, 2025Updated 2 months ago
- upload an SPDX 2.2 formatted SBOM to GitHub's dependency submission API☆21Updated this week
- Various tools, images, etc. to support the Wolfi OSS project☆27Updated this week
- GitHub actions for the chainguard-images☆21Updated this week
- Container image provenance spec that allows tracing CVEs detected in registry images back to a CVE's source of origin.