marklechner / priscope
A security tool designed to help review merged code changes to open source maintained repositories via LLM assisted review to safeguard against supply chain attacks
☆30Updated 6 months ago
Alternatives and similar repositories for priscope:
Users that are interested in priscope are comparing it to the libraries listed below
- ☆54Updated this week
- Compares and analyzes GCP IAM roles.☆77Updated last month
- Clean accounts over permissions in GCP infra at scale☆71Updated last year
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆15Updated this week
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61Updated last year
- kntrl is an eBPF based runtime agent that monitors and prevents anomalous behaviour defined by you on your pipeline. kntrl achieves this …☆110Updated 2 weeks ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆31Updated 6 months ago
- The security workflow engine!☆111Updated this week
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆52Updated 10 months ago
- ☆112Updated 3 months ago
- HashiCorp-relevant rules for the Semgrep code analysis tool☆41Updated last year
- A tool for preventing the installation of malicious PyPI and npm packages☆140Updated this week
- Unauthenticated enumeration of AWS IAM Roles.☆24Updated 3 months ago
- prel(iminary) is an application that temporarily assigns Google Cloud IAM Roles and includes an approval process.☆44Updated this week
- a tool to audit the istio service mesh☆173Updated 3 years ago
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆39Updated 8 months ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆82Updated 4 months ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆53Updated 3 months ago
- Automate vulnerability triage which prioritizes remediation over discovery☆16Updated this week
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆47Updated last year
- Template Go app repo with local test/lint/build/vulnerability check workflow, and on tag image test/build/release pipelines, with ko gene…☆104Updated last year
- Takes a software bill of materials and outputs provenance, and activity data from trustypkg.dev☆11Updated 6 months ago
- Kubernetes audit logging, when you don't control the control plane☆74Updated this week
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆28Updated 2 months ago
- Semgrep-based Policy Controller for Kubernetes☆47Updated last month
- ☆64Updated last week
- ☆29Updated 6 months ago
- vexctl is a tool to attest VEX impact statements☆44Updated 2 years ago
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆95Updated 3 weeks ago
- A place for the InfoSec community to share and celebrate real stories of organizations successfully using SBOMs (and other bills of mater…☆42Updated last year