kubescape / sneefferLinks
Sneefer is a PoC project showing how to filter out irrelevent vulnerabilities from container image vulnerability scan results. It is based on application monitoring using eBPF and Falco base libraries and writes results in Kubernetes CRDs
☆26Updated 2 years ago
Alternatives and similar repositories for sneeffer
Users that are interested in sneeffer are comparing it to the libraries listed below
Sorting:
- Scans SBOMs for vulnerabilities with Grype☆85Updated last week
- This is a POC repository showing how a Kubernetes Admission Controller can be made irrelevant when verifying container image signatures☆12Updated 3 years ago
- sigstore the hard way!☆116Updated 5 months ago
- The regolibrary package contains the controls Kubescape uses for detecting misconfigurations in Kubernetes manifests.☆129Updated 2 weeks ago
- Simple tool that allows you to detect imposter commits in GitHub Actions workflows.☆26Updated last year
- Supporting code and demos for KubeCon EU 2023 talk "Malicious Compliance: Reflections on Trusting Container Image Scanners"☆67Updated 2 years ago
- Template Go app repo with local test/lint/build/vulnerability check workflow, and on tag image test/build/release pipelines, with ko gene…☆104Updated last year
- ☆20Updated 7 months ago
- ☆28Updated 7 months ago
- Kubernetes audit logging, when you don't control the control plane☆90Updated this week
- BadRobot - Operator Security Audit Tool☆223Updated 2 weeks ago
- A tool to create, transform and attest VEX metadata☆170Updated this week
- A replacement for "kubectl exec" that works over WebSocket connections.☆42Updated last year
- 🔴🟡🟢 The Amazing Multipurpose Policy Engine (and L)☆37Updated 2 weeks ago
- Administrative tooling for Falco☆121Updated 2 weeks ago
- A place for policy work group related proposals and prototypes.☆65Updated 7 months ago
- Runtime security plug to protect user containers☆66Updated 3 weeks ago
- Run Falco in a GitHub Actions to detect suspicious behavior in your CI/CD☆43Updated 2 months ago
- vexctl is a tool to attest VEX impact statements☆45Updated 2 years ago
- This is just a proof-of-concept project that aims to sign and verify container images using cosign and OPA (Open Policy Agent)☆63Updated 4 years ago
- Trust Dexter to ensure that all your images are pinned by digest for better security☆31Updated 2 years ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆111Updated last year
- Security advisory data for Wolfi☆20Updated this week
- Community curated list of System and Network policy templates for the KubeArmor and Cilium☆50Updated this week
- sigstore installation walkthrough, local☆62Updated last month
- Runtime detection and response for malicious events in Kubernetes workloads☆46Updated last year
- Archivista is a graph and storage service for in-toto attestations. Archivista enables the discovery and retrieval of attestations for so…☆103Updated this week
- a tool to audit the istio service mesh☆173Updated 4 years ago
- kubectl plugin for signing Kubernetes manifest YAML files with sigstore☆85Updated 3 weeks ago
- This repo. is archived. The utility is now at: https://github.com/CycloneDX/sbom-utility☆60Updated 2 years ago