smithy-security / smithy
The security workflow engine!
☆95Updated this week
Alternatives and similar repositories for smithy:
Users that are interested in smithy are comparing it to the libraries listed below
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆30Updated 4 months ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆171Updated 3 months ago
- Kubernetes audit logging, when you don't control the control plane☆67Updated this week
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆60Updated last year
- A security tool designed to help review merged code changes to open source maintained repositories via LLM assisted review to safeguard a…☆30Updated 4 months ago
- This repo. is archived. The utility is now at: https://github.com/CycloneDX/sbom-utility☆61Updated last year
- ☆53Updated this week
- ☆91Updated this week
- A tool to check the security settings of Github Organizations.☆71Updated last year
- ☆163Updated 5 months ago
- Compares and analyzes GCP IAM roles.☆77Updated 8 months ago
- Clean accounts over permissions in GCP infra at scale☆71Updated last year
- prel(iminary) is an application that temporarily assigns Google Cloud IAM Roles and includes an approval process.☆38Updated this week
- Discover vulnerabilities and container image misconfiguration in production environments.☆54Updated last week
- A standard API specification for exchanging supply chain artifacts and intelligence☆72Updated last week
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆82Updated last week
- A tool for preventing the installation of malicious PyPI and npm packages☆124Updated last week
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆38Updated 5 months ago
- Protect against subdomain takeover☆92Updated 8 months ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆52Updated 3 weeks ago
- Takes a software bill of materials and outputs provenance, and activity data from trustypkg.dev☆11Updated 4 months ago
- Template Go app repo with local test/lint/build/vulnerability check workflow, and on tag image test/build/release pipelines, with ko gene…☆104Updated 9 months ago
- ☆111Updated last month
- a tool to audit the istio service mesh☆174Updated 3 years ago
- HashiCorp-relevant rules for the Semgrep code analysis tool☆39Updated last year
- Security tool against dependency typosquatting attacks☆39Updated last week
- AWS honey token manager☆87Updated 6 months ago
- ☆28Updated 3 months ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆59Updated last year