slashben / beat-ac-cosign-verifierLinks
This is a POC repository showing how a Kubernetes Admission Controller can be made irrelevant when verifying container image signatures
☆12Updated 3 years ago
Alternatives and similar repositories for beat-ac-cosign-verifier
Users that are interested in beat-ac-cosign-verifier are comparing it to the libraries listed below
Sorting:
- ☆28Updated 7 months ago
- sigstore the hard way!☆116Updated 5 months ago
- This is just a proof-of-concept project that aims to sign and verify container images using cosign and OPA (Open Policy Agent)☆63Updated 4 years ago
- Evolution process of The Falco Project☆59Updated last week
- Simple tool that allows you to detect imposter commits in GitHub Actions workflows.☆26Updated last year
- vexctl is a tool to attest VEX impact statements☆45Updated 2 years ago
- ☆20Updated 7 months ago
- Administrative tooling for Falco☆121Updated 2 weeks ago
- The regolibrary package contains the controls Kubescape uses for detecting misconfigurations in Kubernetes manifests.☆129Updated 2 weeks ago
- A replacement for "kubectl exec" that works over WebSocket connections.☆42Updated last year
- Runtime security plug to protect user containers☆66Updated 3 weeks ago
- ☆73Updated 7 months ago
- a tool to audit the istio service mesh☆173Updated 4 years ago
- Kubernetes audit logging, when you don't control the control plane☆90Updated last week
- Anchore Kubernetes Inventory can poll Kubernetes Cluster API(s) to tell Anchore Enterprise which Containers and Images are currently in-u…☆67Updated last week
- Sneefer is a PoC project showing how to filter out irrelevent vulnerabilities from container image vulnerability scan results. It is base…☆26Updated 2 years ago
- Kubernetes admission webhook that uses cosign verify to check the subject and issuer of the image matches what you expect☆24Updated 2 weeks ago
- Scans SBOMs for vulnerabilities with Grype☆85Updated last week
- Manage AppAmormor profiles for Kubernetes cluster☆42Updated 2 years ago
- A highly configurable build executor and observer designed to generate signed SLSA provenance attestations about build runs.☆70Updated 3 weeks ago
- ☆19Updated last year
- sigstore installation walkthrough, local☆62Updated last month
- Open Source runtime scanner for k8s cluster and perform security audit checks based on CIS Kubernetes Benchmark specification☆69Updated last month
- Generate a variety of suspect actions that are detected by Falco rulesets☆114Updated 7 months ago
- Showcasing the potential of SPIFFE with real-life services☆10Updated last month
- Kubernetes Native, Runtime Container Image Scanning☆39Updated 3 years ago
- kubectl plugin for signing Kubernetes manifest YAML files with sigstore☆85Updated 3 weeks ago
- Generate K8s RBAC policies based on e2e test runs☆28Updated 4 years ago
- Trivy plugin for OCI referrers☆23Updated last year
- Security configuration checks for popular cloud native applications and infrastructure.☆119Updated 3 years ago