nsmith5 / rekor-sidekickLinks
🔍 Rekor transparency log monitoring and alerting
☆27Updated 2 years ago
Alternatives and similar repositories for rekor-sidekick
Users that are interested in rekor-sidekick are comparing it to the libraries listed below
Sorting:
- A highly configurable build executor and observer designed to generate signed SLSA provenance attestations about build runs.☆72Updated last week
- ☆20Updated last week
- Container image provenance spec that allows tracing CVEs detected in registry images back to a CVE's source of origin.☆45Updated 2 years ago
- sigstore installation walkthrough, local☆62Updated 2 months ago
- Keyless Git signing with cosign!☆11Updated 3 years ago
- Stuff to make standing up sigstore (esp. for testing) easier for e2e/integration testing.☆71Updated this week
- Transparenty Immutable Container Image Tags☆20Updated 2 years ago
- ☆58Updated 3 years ago
- 🔮 ✈️ to integrate OPA Gatekeeper's new ExternalData feature with cosign to determine whether the images are valid by verifying their sig…☆79Updated 2 months ago
- ☆35Updated 4 years ago
- Build and deploy Go applications with Terraform☆30Updated last week
- ☆29Updated last year
- Trust Dexter to ensure that all your images are pinned by digest for better security☆31Updated 2 years ago
- Helm charts for sigstore project☆87Updated last week
- Sigstore Policy Controller - an admission controller that can be used to enforce policy on a Kubernetes cluster based on verifiable supp…☆154Updated this week
- sigstore the hard way!☆118Updated 6 months ago
- Anchore Kubernetes Inventory can poll Kubernetes Cluster API(s) to tell Anchore Enterprise which Containers and Images are currently in-u…☆68Updated last week
- Mattermost builder☆11Updated 4 years ago
- A place for policy work group related proposals and prototypes.☆65Updated 8 months ago
- A simple tool for converting Rego (OPA) rule into command.☆30Updated 3 years ago
- This is just a proof-of-concept project that aims to sign and verify container images using cosign and OPA (Open Policy Agent)☆63Updated 4 years ago
- Administrative tooling for Falco☆121Updated this week
- Dynamic GitHub Actions from Wolfi packages☆44Updated 8 months ago
- Example goreleaser + github actions config with keyless signing, SBOM generation, and attestations☆58Updated last week
- ☆23Updated 2 weeks ago
- kubectl plugin for signing Kubernetes manifest YAML files with sigstore☆85Updated last week
- Container Storage Interface components for SPIFFE☆63Updated 2 weeks ago
- bot to bump version of plugin in krew-index on new releases☆54Updated last year
- A Go implementation of in-toto. in-toto is a framework to protect software supply chain integrity.☆144Updated 2 weeks ago
- This tool allows using a SPIFFE JWT to authenticate to AWS APIs☆36Updated 2 months ago