in-toto / supply-chain-compromisesLinks
☆22Updated 4 years ago
Alternatives and similar repositories for supply-chain-compromises
Users that are interested in supply-chain-compromises are comparing it to the libraries listed below
Sorting:
- A dataset of software supply chain compromises. Please help us maintain it!☆130Updated 3 years ago
- Feed parsing for language package manager updates☆80Updated last year
- A community collection of security reviews of open source software components.☆96Updated last year
- App that simplifies building decision trees to model adverse scenarios☆220Updated last year
- The OpenSSF Vulnerability Disclosures Working Group seeks to help improve the overall security of the open source software ecosystem by h…☆204Updated 2 months ago
- Going Florida on container keyring masks. A tool to demonstrate the ineffectivity containers have on isolating Linux Kernel keyrings.☆44Updated 2 weeks ago
- ☆93Updated 3 years ago
- A tool to automatically build a dependency graph and Software Bill of Materials (SBOM) for packages and arbitrary source code repositorie…☆376Updated last week
- CVE.ICU code.☆49Updated this week
- Stakeholder-Specific Vulnerability Categorization☆166Updated last week
- Scans every git push to your Github organisations to find unwanted secrets.☆87Updated 7 months ago
- A tool to check the security settings of Github Organizations.☆72Updated 2 years ago
- ☆48Updated this week
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebas…☆155Updated last year
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆106Updated 7 years ago
- Security scanning & static analysis tool☆93Updated last year
- Technical Advisory Council☆133Updated 2 weeks ago
- This repo is a consolidation of Secure Software Supply Chain resources, such as talks, whitepapers, conferences and more.☆139Updated 3 years ago
- GCP CSPM using Google Sheets☆37Updated 8 months ago
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆79Updated last week
- Provide a shell like interface by utilizing osquery's distributed API☆81Updated 5 years ago
- A place to systematically store software bill of materials (SBOM) documents.☆47Updated 2 years ago
- vexctl is a tool to attest VEX impact statements☆45Updated 2 years ago
- Tool for collecting vulnerability data from various sources (used to build the grype database)☆106Updated this week
- ☆19Updated 4 months ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆177Updated last year
- Collect, curate, and communicate relevant security metrics for open source projects.☆63Updated last year
- Open Source Vulnerability schema.☆216Updated last week
- ☆69Updated 4 months ago
- Our objective is to enable open source maintainers, contributors and end-users to understand and make decisions on the provenance of the …☆194Updated last year