gorrion-io / production-readiness-checklist
โ22Updated 7 months ago
Alternatives and similar repositories for production-readiness-checklist:
Users that are interested in production-readiness-checklist are comparing it to the libraries listed below
- ๐๏ธ STRIDE vs. ASVS equivalence tableโ76Updated 7 months ago
- Security tool against dependency typosquatting attacksโ39Updated last week
- โ60Updated 2 months ago
- Scans your Github Actions for security issuesโ62Updated last month
- A tool for preventing the installation of malicious PyPI and npm packagesโ130Updated this week
- AI featured threat modeling and security review actionโ43Updated 4 months ago
- Open-source best practices for protecting a secure, sensible cloud platformโ124Updated 5 months ago
- A tool to check the security settings of Github Organizations.โ71Updated last year
- โ35Updated 3 years ago
- Awesome secure by default libraries to help you eliminate bug classes!โ687Updated 3 weeks ago
- A small tool to help developers understand a huge set of security requirements from appsec teamsโ45Updated 2 years ago
- โ106Updated 8 months ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accountsโ61Updated last year
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.โ107Updated last year
- OWASP Foundation Web Respositoryโ82Updated 2 months ago
- Demonstrates how a malicious dependency could negatively impact the build output.โ25Updated last year
- Detect publicly accessible Lambda Function URLs in your AWS accountโ9Updated 2 years ago
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKSโ39Updated 7 months ago
- ๐งช Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.โ39Updated 3 months ago
- A utility to (re-)import findings and language data into DefectDojoโ42Updated 6 months ago
- Protect against subdomain takeoverโ93Updated 10 months ago
- Too many secrets (2MS) helps people protect their secrets on any file or on systems like CMS, chats and gitโ90Updated this week
- Cloud Commotion intends to cause chaos to simulate security incidentsโ145Updated 9 months ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrixโ58Updated last year
- Compares and analyzes GCP IAM roles.โ77Updated 3 weeks ago
- drHEADer helps with the audit of security headers received in response to a single request or a list of requests.โ110Updated 2 months ago
- โ86Updated 3 years ago
- โ76Updated 5 months ago
- โ33Updated 3 years ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.โ170Updated 4 months ago