luhring / example-container-image-supply-chain-security
Example repository that demonstrates a supply chain security workflow using Syft, Grype, Cosign
☆11Updated 3 years ago
Alternatives and similar repositories for example-container-image-supply-chain-security:
Users that are interested in example-container-image-supply-chain-security are comparing it to the libraries listed below
- Transparenty Immutable Container Image Tags☆20Updated last year
- Trust Dexter to ensure that all your images are pinned by digest for better security☆29Updated last year
- ☆20Updated 8 months ago
- Trivy plugin for OCI referrers☆23Updated 11 months ago
- Dynamic GitHub Actions from Wolfi packages☆43Updated 11 months ago
- Fairwinds Base Image Finder CLI☆34Updated last week
- Stuff to make standing up sigstore (esp. for testing) easier for e2e/integration testing.☆62Updated this week
- Keyless Git signing with cosign!☆11Updated 2 years ago
- sigstore installation walkthrough, local☆58Updated 11 months ago
- 🔍 Rekor transparency log monitoring and alerting☆27Updated last year
- kubectl plugin for signing Kubernetes manifest YAML files with sigstore☆80Updated last week
- Scans SBOMs for vulnerabilities with Grype☆80Updated this week
- Sets up Open Policy Agent CLI in your GitHub Actions workflow.☆48Updated last year
- GitHub actions for the chainguard-images☆20Updated last week
- A highly configurable build executor and observer designed to generate signed SLSA provenance attestations about build runs.☆62Updated this week
- ☆14Updated last year
- Github Action to automatically update digests for container images.☆57Updated last month
- Generate K8s RBAC policies based on e2e test runs☆28Updated 3 years ago
- ☆35Updated 3 years ago
- Archivista is a graph and storage service for in-toto attestations. Archivista enables the discovery and retrieval of attestations for so…☆85Updated this week
- This is just a proof-of-concept project that aims to sign and verify container images using cosign and OPA (Open Policy Agent)☆62Updated 3 years ago
- This tool allows using a SPIFFE JWT to authenticate to AWS APIs☆34Updated 10 months ago
- Prototype in-toto attestation verifier based on ITE-10 and ITE-11 layouts☆16Updated 3 weeks ago
- Tracking Kubernetes Operators out in the wild.☆31Updated 5 months ago
- Container image provenance spec that allows tracing CVEs detected in registry images back to a CVE's source of origin.☆43Updated last year
- Policy Reporter Kyverno Plugin☆14Updated 8 months ago
- Lambda function for verifying signed images in ECS☆33Updated last year
- Plugin for Helm to integrate the sigstore ecosystem☆62Updated last week
- A CLI tool to manage context profiles for HashiCorp tools☆32Updated last year
- Helm charts for sigstore project☆72Updated last week