philips-labs / fattLinks
fatt tries to find any purl in your project by looking at predefined fields in the supported packages. These fields describe using a purl where to grab the attestation from.
☆11Updated this week
Alternatives and similar repositories for fatt
Users that are interested in fatt are comparing it to the libraries listed below
Sorting:
- Github Action implementation of SLSA Provenance Generation☆50Updated this week
- Container image provenance spec that allows tracing CVEs detected in registry images back to a CVE's source of origin.☆43Updated last year
- Prototype in-toto attestation verifier based on ITE-10 and ITE-11 layouts☆16Updated last week
- fatbom (Fat Bill Of Materials) is a tool which combines the SBOM generated by various tools into one fat SBOM. Thus leveraging each tool'…☆33Updated 2 years ago
- A highly configurable build executor and observer designed to generate signed SLSA provenance attestations about build runs.☆65Updated this week
- ☆20Updated 3 months ago
- GitHub actions for the chainguard-images☆20Updated this week
- sigstore installation walkthrough, local☆62Updated last year
- This is just a proof-of-concept project that aims to sign and verify container images using cosign and OPA (Open Policy Agent)☆63Updated 4 years ago
- ☆15Updated 2 years ago
- vexctl is a tool to attest VEX impact statements☆45Updated 2 years ago
- ☆57Updated 3 years ago
- Stuff to make standing up sigstore (esp. for testing) easier for e2e/integration testing.☆68Updated this week
- Trust Dexter to ensure that all your images are pinned by digest for better security☆30Updated last year
- kubectl plugin for signing Kubernetes manifest YAML files with sigstore☆84Updated 3 weeks ago
- To manage Docker Content Trust and Notary certificates☆13Updated last week
- Sets up Open Policy Agent CLI in your GitHub Actions workflow.☆52Updated 3 weeks ago
- Overview of philips-labs helm charts☆17Updated last week
- Example repository that demonstrates a supply chain security workflow using Syft, Grype, Cosign☆12Updated 4 years ago
- A simple tool for converting Rego (OPA) rule into command.☆30Updated 3 years ago
- A Github Action to automatically update digests for container images.☆73Updated 3 weeks ago
- SLSA level 3 action☆11Updated last year
- Lambda function for verifying signed images in ECS☆33Updated last year
- This is a POC repository showing how a Kubernetes Admission Controller can be made irrelevant when verifying container image signatures☆12Updated 2 years ago
- Easily run Conftest, pull remote policies, surface the results, and obtain test metrics☆12Updated 6 months ago
- Sysdig Terraform provider. Allow to handle Sysdig Secure policies as code.☆54Updated last month
- Tooling and library for generation, validation and verification of supply chain metadata documents and frameworks☆33Updated 4 months ago
- ☆11Updated 2 years ago
- AWS Signer Plugin for Notation☆15Updated this week
- This tool allows using a SPIFFE JWT to authenticate to AWS APIs☆34Updated 2 months ago