nsmith5 / rekor-sidekickLinks
🔍 Rekor transparency log monitoring and alerting
☆27Updated 2 years ago
Alternatives and similar repositories for rekor-sidekick
Users that are interested in rekor-sidekick are comparing it to the libraries listed below
Sorting:
- A highly configurable build executor and observer designed to generate signed SLSA provenance attestations about build runs.☆65Updated this week
- ☆20Updated 4 months ago
- Container image provenance spec that allows tracing CVEs detected in registry images back to a CVE's source of origin.☆43Updated last year
- sigstore installation walkthrough, local☆63Updated last year
- Stuff to make standing up sigstore (esp. for testing) easier for e2e/integration testing.☆68Updated last week
- Transparenty Immutable Container Image Tags☆20Updated 2 years ago
- ☆57Updated 3 years ago
- Sigstore Policy Controller - an admission controller that can be used to enforce policy on a Kubernetes cluster based on verifiable supp…☆147Updated 2 weeks ago
- Keyless Git signing with cosign!☆11Updated 3 years ago
- Helm charts for sigstore project☆83Updated last week
- 🔮 ✈️ to integrate OPA Gatekeeper's new ExternalData feature with cosign to determine whether the images are valid by verifying their sig…☆79Updated last year
- ☆29Updated last year
- sigstore the hard way!☆117Updated 2 months ago
- Build and deploy Go applications with Terraform☆29Updated last week
- Example goreleaser + github actions config with keyless signing, SBOM generation, and attestations☆58Updated this week
- ☆35Updated 3 years ago
- Anchore Kubernetes Inventory can poll Kubernetes Cluster API(s) to tell Anchore Enterprise which Containers and Images are currently in-u…☆67Updated this week
- ☆22Updated last week
- Trust Dexter to ensure that all your images are pinned by digest for better security☆30Updated last year
- Enabling Software Supply Chain Security Capabilities in ArgoCD☆89Updated 2 years ago
- Plugin for Helm to integrate the sigstore ecosystem☆67Updated this week
- kubectl plugin for signing Kubernetes manifest YAML files with sigstore☆85Updated last month
- A Go implementation of in-toto. in-toto is a framework to protect software supply chain integrity.☆142Updated 2 weeks ago
- Container Storage Interface components for SPIFFE☆63Updated this week
- Example repository that demonstrates a supply chain security workflow using Syft, Grype, Cosign☆12Updated 4 years ago
- A simple tool for converting Rego (OPA) rule into command.☆31Updated 3 years ago
- This is just a proof-of-concept project that aims to sign and verify container images using cosign and OPA (Open Policy Agent)☆63Updated 4 years ago
- This tool allows using a SPIFFE JWT to authenticate to AWS APIs☆34Updated 3 months ago
- A collection of reusable Github Actions workflows.☆146Updated this week
- Container image registry that serves images built fresh when you ask for them☆231Updated 8 months ago