pjbgf-archives / zazLinks
A command line tool to automatically generate seccomp profiles.
☆26Updated 4 years ago
Alternatives and similar repositories for zaz
Users that are interested in zaz are comparing it to the libraries listed below
Sorting:
- sigstore installation walkthrough, local☆62Updated last year
- sigstore the hard way!☆115Updated this week
- Anchore Kubernetes Inventory can poll Kubernetes Cluster API(s) to tell Anchore Enterprise which Containers and Images are currently in-u…☆67Updated last week
- ☆35Updated 3 years ago
- agent for handling seccomp descriptors for container runtimes☆47Updated last year
- Administrative tooling for Falco☆110Updated this week
- Service implementation for a Kubernetes Dynamic Webhook controller for interacting with Anchore☆65Updated last week
- A highly configurable build executor and observer designed to generate signed SLSA provenance attestations about build runs.☆64Updated this week
- Manage AppAmormor profiles for Kubernetes cluster☆42Updated last year
- Scans SBOMs for vulnerabilities with Grype☆84Updated this week
- Sigstore Policy Controller - an admission controller that can be used to enforce policy on a Kubernetes cluster based on verifiable supp…☆140Updated this week
- 🔍 Rekor transparency log monitoring and alerting☆27Updated last year
- kubectl plugin for signing Kubernetes manifest YAML files with sigstore☆84Updated 3 weeks ago
- An admission controller service and kubectl plugin to handle container drift in K8s clusters☆124Updated 3 years ago
- ☆20Updated 2 months ago
- A kubectl plugin which triggers a Sysdig capture☆100Updated 2 years ago
- Stuff to make standing up sigstore (esp. for testing) easier for e2e/integration testing.☆66Updated this week
- Prometheus Metrics Exporter for Falco output events☆122Updated 3 months ago
- Security risk analysis for Kubernetes resources☆74Updated 6 months ago
- Integrates Spiffe and Vault to have secretless authentication☆90Updated last week
- This is just a proof-of-concept project that aims to sign and verify container images using cosign and OPA (Open Policy Agent)☆62Updated 4 years ago
- Enabling Software Supply Chain Security Capabilities in ArgoCD☆88Updated 2 years ago
- Cloud Native Security Hub - Security Resources☆54Updated 5 years ago
- cloud native software supply chain ☁️🔗☆63Updated 4 years ago
- A Kubernetes CSI plugin to automatically mount SPIFFE certificates to Pods using ephemeral volumes☆80Updated last week
- Octant plugin for viewing Starboard security information☆57Updated 3 years ago
- Transparenty Immutable Container Image Tags☆20Updated 2 years ago
- Container image provenance spec that allows tracing CVEs detected in registry images back to a CVE's source of origin.☆43Updated last year
- ☆27Updated 2 years ago
- ☆64Updated last year