openvex / go-vex
Go module to generate and transform VEX documents
☆34Updated 3 weeks ago
Related projects ⓘ
Alternatives and complementary repositories for go-vex
- A tool to create, transform and attest VEX metadata☆117Updated last week
- A highly configurable build executor and observer designed to generate signed SLSA provenance attestations about build runs.☆56Updated this week
- Archivista is a graph and storage service for in-toto attestations. Archivista enables the discovery and retrieval of attestations for so…☆73Updated this week
- Tooling and library for generation, validation and verification of supply chain metadata documents and frameworks☆30Updated 10 months ago
- ☆56Updated 2 years ago
- A CLI used to work with the Wolfi OSS project☆57Updated this week
- ☆19Updated 3 months ago
- Go library for Sigstore signing and verification☆48Updated this week
- ☆30Updated 3 weeks ago
- OpenVEX Specification☆131Updated 4 months ago
- This repo. is archived. The utility is now at: https://github.com/CycloneDX/sbom-utility☆61Updated last year
- Scans SBOMs for vulnerabilities with Grype☆79Updated this week
- ☆61Updated 4 months ago
- Anchore Kubernetes Inventory can poll Kubernetes Cluster API(s) to tell Anchore Enterprise which Containers and Images are currently in-u…☆63Updated this week
- 🔍 Rekor transparency log monitoring and alerting☆27Updated last year
- Format agnostic SBOM tooling☆80Updated this week
- vexctl is a tool to attest VEX impact statements☆44Updated last year
- ☆22Updated last year
- Helm charts for sigstore project☆65Updated last week
- Stuff to make standing up sigstore (esp. for testing) easier for e2e/integration testing.☆57Updated this week
- Sigstore user stories☆29Updated last year
- Security advisory data for Wolfi☆13Updated this week
- An SBOM query language and associated utilities☆54Updated 9 months ago
- Container image provenance spec that allows tracing CVEs detected in registry images back to a CVE's source of origin.☆41Updated last year
- A sweet little formatter for YAML☆20Updated 3 weeks ago
- Helm Chart for deploying GUAC☆14Updated 3 months ago
- A Go implementation of in-toto. in-toto is a framework to protect software supply chain integrity.☆131Updated last week
- Go library for Sigstore signing and verification☆16Updated last year
- Go implementation of witness☆26Updated last week
- Go client library for OWASP Dependency-Track☆22Updated 2 weeks ago