philips-labs / slsa-provenance-action
Github Action implementation of SLSA Provenance Generation
☆47Updated last week
Alternatives and similar repositories for slsa-provenance-action:
Users that are interested in slsa-provenance-action are comparing it to the libraries listed below
- An SBOM query language and associated utilities☆54Updated last year
- fatt tries to find any purl in your project by looking at predefined fields in the supported packages. These fields describe using a purl…☆10Updated this week
- vexctl is a tool to attest VEX impact statements☆44Updated 2 years ago
- Archivista is a graph and storage service for in-toto attestations. Archivista enables the discovery and retrieval of attestations for so…☆85Updated this week
- ☆56Updated 2 years ago
- fatbom (Fat Bill Of Materials) is a tool which combines the SBOM generated by various tools into one fat SBOM. Thus leveraging each tool'…☆32Updated 2 years ago
- A highly configurable build executor and observer designed to generate signed SLSA provenance attestations about build runs.☆62Updated this week
- A specification for signing methods and formats used by Secure Systems Lab projects.☆73Updated 7 months ago
- Proof-of-concept SLSA provenance generator for GitHub Actions☆99Updated 2 years ago
- Stuff to make standing up sigstore (esp. for testing) easier for e2e/integration testing.☆62Updated this week
- ☆42Updated 5 months ago
- Sets up Open Policy Agent CLI in your GitHub Actions workflow.☆48Updated last year
- Dynamic GitHub Actions from Wolfi packages☆43Updated 11 months ago
- A tool to create, transform and attest VEX metadata☆134Updated this week
- Transparenty Immutable Container Image Tags☆20Updated last year
- Helm charts for sigstore project☆72Updated this week
- This repo. is archived. The utility is now at: https://github.com/CycloneDX/sbom-utility☆60Updated last year
- Prototype in-toto attestation verifier based on ITE-10 and ITE-11 layouts☆16Updated 2 weeks ago
- CLI for searching Rego policies☆105Updated 3 years ago
- Trivy plugin for OCI referrers☆23Updated 11 months ago
- Website for OmniBOR, reproducible identifiers & fine-grained build dependency tracking for software artifacts.☆21Updated 2 months ago
- sigstore installation walkthrough, local☆57Updated 11 months ago
- ☆14Updated last year
- Darkfiles finds orphaned files in container images and makes them to bad deeds☆41Updated last year
- Trust Dexter to ensure that all your images are pinned by digest for better security☆29Updated last year
- Go implementation for CNAB content trust verification using TUF, Notary, and in-toto☆31Updated last year
- Example repository that demonstrates a supply chain security workflow using Syft, Grype, Cosign☆11Updated 3 years ago
- This tool allows using a SPIFFE JWT to authenticate to AWS APIs☆34Updated 10 months ago
- Container image provenance spec that allows tracing CVEs detected in registry images back to a CVE's source of origin.☆43Updated last year
- Tooling and library for generation, validation and verification of supply chain metadata documents and frameworks☆31Updated last year