Supply-chain Levels for Software Artifacts
☆1,814Feb 20, 2026Updated last week
Alternatives and similar repositories for slsa
Users that are interested in slsa are comparing it to the libraries listed below
Sorting:
- in-toto is a framework to protect supply chain integrity.☆974Feb 11, 2026Updated 2 weeks ago
- GUAC aggregates software security metadata into a high fidelity graph database.☆1,450Updated this week
- OpenSSF Scorecard - Security health metrics for Open Source☆5,283Updated this week
- Code signing and transparency for containers and binaries☆5,683Updated this week
- in-toto Attestation Framework☆326Feb 17, 2026Updated last week
- Language-agnostic SLSA provenance generation for Github Actions☆549Updated this week
- Software Supply Chain Transparency Log☆1,088Updated this week
- Verify provenance from SLSA compliant builders☆310Nov 20, 2025Updated 3 months ago
- Sigstore OIDC PKI☆807Updated this week
- Witness is a pluggable framework for software supply chain risk management. It automates, normalizes, and verifies software artifact pro…☆517Updated this week
- ☆255Updated this week
- 🔐CNCF Security Technical Advisory Group -- secure access, policy control, privacy, auditing, explainability and more!☆2,256Dec 8, 2025Updated 2 months ago
- CLI tool and library for generating a Software Bill of Materials from container images and filesystems☆8,416Updated this week
- Proof-of-concept SLSA provenance generator for GitHub Actions☆100Nov 1, 2022Updated 3 years ago
- OWASP CycloneDX is a full-stack Bill of Materials (BOM) standard that provides advanced supply chain capabilities for cyber risk reductio…☆485Updated this week
- Open source vulnerability DB and triage service.☆2,501Updated this week
- The S2C2F Project is a group working within the OpenSSF's Supply Chain Integrity Working Group formed to further develop and continuously…☆227May 26, 2025Updated 9 months ago
- Supply Chain Security in Tekton Pipelines☆269Updated this week
- GitHub App to set and enforce security policies☆1,391Updated this week
- A vulnerability scanner for container images and filesystems☆11,602Updated this week
- Our objective is to enable open source maintainers, contributors and end-users to understand and make decisions on the provenance of the …☆197Jan 15, 2026Updated last month
- Keyless Git signing using Sigstore☆1,063Updated this week
- A specification for signing methods and formats used by Secure Systems Lab projects.☆94Nov 10, 2025Updated 3 months ago
- A minimal specification for purl aka. a package "mostly universal" URL, join the discussion at https://gitter.im/package-url/Lobby☆980Updated this week
- A Go implementation of in-toto. in-toto is a framework to protect software supply chain integrity.☆145Feb 13, 2026Updated 2 weeks ago
- SLSA Proposals☆11Jan 29, 2024Updated 2 years ago
- A utility to generate SPDX-compliant Bill of Materials manifests☆441Updated this week
- Securing Alice's, Bob's and Carl's software supply chain using in-toto☆104Feb 11, 2026Updated 2 weeks ago
- Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more☆32,280Updated this week
- An open-source tool for auditing your software supply chain stack for security compliance based on a new CIS Software Supply Chain benchm…☆769Dec 11, 2024Updated last year
- Format agnostic SBOM tooling☆132Nov 20, 2025Updated 3 months ago
- eBPF-based Security Observability and Runtime Enforcement☆4,431Updated this week
- Cloud Native Runtime Security☆8,690Updated this week
- Dependency-Track is an intelligent Component Analysis platform that allows organizations to identify and reduce risk in the software supp…☆3,623Updated this week
- A reading list for software supply-chain security.☆365Nov 21, 2022Updated 3 years ago
- The SBOM tool is a highly scalable and enterprise ready tool to create SPDX 2.2 compatible SBOMs for any variety of artifacts.☆1,984Feb 20, 2026Updated last week
- Vulnerability scanner written in Go which uses the data provided by https://osv.dev☆8,480Updated this week
- Artifact Metadata API☆1,564Feb 13, 2026Updated 2 weeks ago
- Find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle of your infrastruct…☆2,574Updated this week