philips-labs / fattLinks
fatt tries to find any purl in your project by looking at predefined fields in the supported packages. These fields describe using a purl where to grab the attestation from.
☆11Updated last week
Alternatives and similar repositories for fatt
Users that are interested in fatt are comparing it to the libraries listed below
Sorting:
- Github Action implementation of SLSA Provenance Generation☆49Updated last week
- Container image provenance spec that allows tracing CVEs detected in registry images back to a CVE's source of origin.☆43Updated last year
- A highly configurable build executor and observer designed to generate signed SLSA provenance attestations about build runs.☆64Updated last week
- fatbom (Fat Bill Of Materials) is a tool which combines the SBOM generated by various tools into one fat SBOM. Thus leveraging each tool'…☆33Updated 2 years ago
- vexctl is a tool to attest VEX impact statements☆44Updated 2 years ago
- GitHub actions for the chainguard-images☆20Updated 3 months ago
- Prototype in-toto attestation verifier based on ITE-10 and ITE-11 layouts☆16Updated 3 weeks ago
- ☆20Updated 2 months ago
- sigstore installation walkthrough, local☆62Updated last year
- Archivista is a graph and storage service for in-toto attestations. Archivista enables the discovery and retrieval of attestations for so…☆98Updated last week
- ☆57Updated 3 years ago
- To manage Docker Content Trust and Notary certificates☆13Updated this week
- Stuff to make standing up sigstore (esp. for testing) easier for e2e/integration testing.☆66Updated this week
- Sets up Open Policy Agent CLI in your GitHub Actions workflow.☆51Updated last year
- SLSA level 3 action☆11Updated last year
- A Github Action to automatically update digests for container images.☆68Updated 2 months ago
- Unified Policy Engine☆63Updated last week
- ☆11Updated 2 years ago
- Example repository that demonstrates a supply chain security workflow using Syft, Grype, Cosign☆11Updated 3 years ago
- Check images in your charts for vulnerabilities☆41Updated last month
- Sigstore user stories☆30Updated last year
- This is just a proof-of-concept project that aims to sign and verify container images using cosign and OPA (Open Policy Agent)☆62Updated 4 years ago
- This tool allows using a SPIFFE JWT to authenticate to AWS APIs☆34Updated 3 weeks ago
- ☆15Updated 2 years ago
- Overview of philips-labs helm charts☆17Updated last week
- Slack alert bot for matching Github Audit Events☆10Updated 8 months ago
- Trust Dexter to ensure that all your images are pinned by digest for better security☆30Updated last year
- Demos and resources of the Istio + Gatekeeper talks at IstioCon 2022 and GitOpsCon 2022☆14Updated last year
- This is a POC repository showing how a Kubernetes Admission Controller can be made irrelevant when verifying container image signatures☆12Updated 2 years ago
- A simple tool for converting Rego (OPA) rule into command.☆30Updated 3 years ago