philips-labs / fattLinks
fatt tries to find any purl in your project by looking at predefined fields in the supported packages. These fields describe using a purl where to grab the attestation from.
☆11Updated last week
Alternatives and similar repositories for fatt
Users that are interested in fatt are comparing it to the libraries listed below
Sorting:
- Github Action implementation of SLSA Provenance Generation☆50Updated last week
- Container image provenance spec that allows tracing CVEs detected in registry images back to a CVE's source of origin.☆45Updated 2 years ago
- A highly configurable build executor and observer designed to generate signed SLSA provenance attestations about build runs.☆70Updated 3 weeks ago
- vexctl is a tool to attest VEX impact statements☆45Updated 2 years ago
- Prototype in-toto attestation verifier based on ITE-10 and ITE-11 layouts☆17Updated 3 weeks ago
- GitHub actions for the chainguard-images☆22Updated 2 weeks ago
- Sets up Open Policy Agent CLI in your GitHub Actions workflow.☆54Updated last month
- sigstore installation walkthrough, local☆62Updated last month
- This is just a proof-of-concept project that aims to sign and verify container images using cosign and OPA (Open Policy Agent)☆63Updated 4 years ago
- fatbom (Fat Bill Of Materials) is a tool which combines the SBOM generated by various tools into one fat SBOM. Thus leveraging each tool'…☆33Updated 3 years ago
- ☆20Updated 7 months ago
- A simple tool for converting Rego (OPA) rule into command.☆31Updated 3 years ago
- To manage Docker Content Trust and Notary certificates☆13Updated this week
- ☆15Updated 2 years ago
- Website for OmniBOR, reproducible identifiers & fine-grained build dependency tracking for software artifacts.☆21Updated 11 months ago
- ☆58Updated 3 years ago
- cloud native software supply chain ☁️🔗☆65Updated 4 years ago
- Trivy plugin for OCI referrers☆23Updated last year
- Archivista is a graph and storage service for in-toto attestations. Archivista enables the discovery and retrieval of attestations for so…☆103Updated last week
- kubectl plugin for signing Kubernetes manifest YAML files with sigstore☆85Updated 3 weeks ago
- This tool allows using a SPIFFE JWT to authenticate to AWS APIs☆35Updated last month
- SLSA level 3 action☆11Updated last year
- An SBOM query language and associated utilities☆55Updated last year
- Example repository that demonstrates a supply chain security workflow using Syft, Grype, Cosign☆12Updated 4 years ago
- ☆11Updated 3 years ago
- Build and deploy Go applications with Terraform☆29Updated 2 weeks ago
- Trust Dexter to ensure that all your images are pinned by digest for better security☆31Updated 2 years ago
- Stuff to make standing up sigstore (esp. for testing) easier for e2e/integration testing.☆70Updated last week
- ☆51Updated last month
- ☆23Updated 2 years ago