philips-labs / fattLinks
fatt tries to find any purl in your project by looking at predefined fields in the supported packages. These fields describe using a purl where to grab the attestation from.
☆11Updated last week
Alternatives and similar repositories for fatt
Users that are interested in fatt are comparing it to the libraries listed below
Sorting:
- Github Action implementation of SLSA Provenance Generation☆50Updated this week
- Container image provenance spec that allows tracing CVEs detected in registry images back to a CVE's source of origin.☆45Updated 2 years ago
- A highly configurable build executor and observer designed to generate signed SLSA provenance attestations about build runs.☆70Updated last week
- vexctl is a tool to attest VEX impact statements☆45Updated 2 years ago
- GitHub actions for the chainguard-images☆22Updated last week
- This tool allows using a SPIFFE JWT to authenticate to AWS APIs☆34Updated last week
- ☆58Updated 3 years ago
- sigstore installation walkthrough, local☆62Updated last week
- To manage Docker Content Trust and Notary certificates☆13Updated last week
- ☆20Updated 6 months ago
- ☆23Updated 2 years ago
- ☆19Updated last year
- Stuff to make standing up sigstore (esp. for testing) easier for e2e/integration testing.☆68Updated last week
- Archivista is a graph and storage service for in-toto attestations. Archivista enables the discovery and retrieval of attestations for so…☆103Updated last week
- Example repository that demonstrates a supply chain security workflow using Syft, Grype, Cosign☆12Updated 4 years ago
- Keyless Git signing with cosign!☆11Updated 3 years ago
- Prototype in-toto attestation verifier based on ITE-10 and ITE-11 layouts☆17Updated last week
- fatbom (Fat Bill Of Materials) is a tool which combines the SBOM generated by various tools into one fat SBOM. Thus leveraging each tool'…☆33Updated 3 years ago
- Kubernetes admission webhook that uses cosign verify to check the subject and issuer of the image matches what you expect☆24Updated this week
- ☆15Updated 2 years ago
- A simple tool for converting Rego (OPA) rule into command.☆31Updated 3 years ago
- A Github Action to automatically update digests for container images.☆80Updated last month
- Proof-of-concept SLSA provenance generator for GitHub Actions☆100Updated 3 years ago
- kubectl plugin for signing Kubernetes manifest YAML files with sigstore☆85Updated last week
- Trust Dexter to ensure that all your images are pinned by digest for better security☆31Updated 2 years ago
- Transparenty Immutable Container Image Tags☆20Updated 2 years ago
- Integrates Spiffe and Vault to have secretless authentication☆96Updated 2 weeks ago
- ☆32Updated 6 years ago
- This is a POC repository showing how a Kubernetes Admission Controller can be made irrelevant when verifying container image signatures☆12Updated 2 years ago
- Website for OmniBOR, reproducible identifiers & fine-grained build dependency tracking for software artifacts.☆21Updated 10 months ago