smithy-security / smithy
The security workflow engine!
☆73Updated this week
Related projects ⓘ
Alternatives and complementary repositories for smithy
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆169Updated 9 months ago
- ☆80Updated this week
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆30Updated last month
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆57Updated last year
- ☆51Updated 8 months ago
- 🖇️ STRIDE vs. ASVS equivalence table☆75Updated 2 months ago
- Discover vulnerabilities and container image misconfiguration in production environments.☆53Updated 2 months ago
- AI featured threat modeling and security review action☆40Updated this week
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆55Updated 4 months ago
- A tool to check the security settings of Github Organizations.☆69Updated last year
- Protect against subdomain takeover☆92Updated 5 months ago
- Compares and analyzes GCP IAM roles.☆76Updated 5 months ago
- Clean accounts over permissions in GCP infra at scale☆71Updated last year
- A security tool designed to help review merged code changes to open source maintained repositories via LLM assisted review to safeguard a…☆28Updated last month
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆59Updated 8 months ago
- 🧪 Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.☆33Updated last month
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆67Updated 6 months ago
- boostsecurityio/poutine☆231Updated this week
- Tool for obfuscating and deobfuscating data.☆64Updated 8 months ago
- Takes a software bill of materials and outputs provenance, and activity data from trustypkg.dev☆11Updated last month
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆79Updated this week
- ☆107Updated last month
- HashiCorp-relevant rules for the Semgrep code analysis tool☆37Updated last year
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆34Updated 2 months ago
- ☆95Updated this week
- prel(iminary) is an application that temporarily assigns Google Cloud IAM Roles and includes an approval process.☆37Updated this week
- WAF bypass PoC☆43Updated last year
- ☆46Updated this week
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆126Updated 9 months ago