in-toto / archivistaLinks
Archivista is a graph and storage service for in-toto attestations. Archivista enables the discovery and retrieval of attestations for software artifacts.
☆98Updated this week
Alternatives and similar repositories for archivista
Users that are interested in archivista are comparing it to the libraries listed below
Sorting:
- A tool to create, transform and attest VEX metadata☆151Updated this week
- ☆243Updated this week
- ☆63Updated last year
- Stuff to make standing up sigstore (esp. for testing) easier for e2e/integration testing.☆68Updated last week
- vexctl is a tool to attest VEX impact statements☆45Updated 2 years ago
- A specification for signing methods and formats used by Secure Systems Lab projects.☆83Updated 11 months ago
- Tooling and library for generation, validation and verification of supply chain metadata documents and frameworks☆32Updated 3 months ago
- Sigstore Policy Controller - an admission controller that can be used to enforce policy on a Kubernetes cluster based on verifiable supp…☆141Updated last week
- sigstore installation walkthrough, local☆62Updated last year
- sigstore the hard way!☆115Updated 2 weeks ago
- in-toto Attestation Framework☆291Updated 2 weeks ago
- Visualizer for GUAC☆28Updated this week
- Generate a score for your sbom to understand if it will actually be useful.☆232Updated last year
- Software Supply Chain Attribute Integrity (SCAI) Demos and CLI tools☆18Updated last week
- OpenVEX Specification☆156Updated 2 months ago
- Format agnostic SBOM tooling☆114Updated this week
- Securing Alice's, Bob's and Carl's software supply chain using in-toto☆94Updated last week
- Go implementation of witness☆36Updated last week
- General sigstore community repo☆41Updated this week
- ☆57Updated 3 years ago
- Log monitor for Rekor to verify immutability and monitor entries☆36Updated this week
- A CLI tool for creating secure by design/default source repos.☆26Updated last year
- kubectl plugin for signing Kubernetes manifest YAML files with sigstore☆84Updated last month
- Helm charts for sigstore project☆78Updated this week
- A highly configurable build executor and observer designed to generate signed SLSA provenance attestations about build runs.☆65Updated last week
- A Go implementation of in-toto. in-toto is a framework to protect software supply chain integrity.☆140Updated last week
- Verify provenance from SLSA compliant builders☆278Updated 3 weeks ago
- GitHub Action for creating software bill of materials using Syft.☆198Updated last week
- Enrich SBOMs with data from third party services☆186Updated last week
- A CLI used to work with the Wolfi OSS project☆65Updated this week