testifysec / go-imaLinks
go-ima is a tool that checks if a file has been tampered with. It is useful in ensuring integrity in CI systems
☆13Updated last year
Alternatives and similar repositories for go-ima
Users that are interested in go-ima are comparing it to the libraries listed below
Sorting:
- Red team tool that emulates the SolarWinds CI compromise attack vector.☆24Updated last year
- vexctl is a tool to attest VEX impact statements☆45Updated 2 years ago
- An query language and interactive tooling to work with SBOM data.☆14Updated 11 months ago
- Witness Examples☆11Updated last year
- A trivial wrapper around spf13/cobra to simplify some basic patterns☆22Updated last year
- A docker CLI plugin for verifying signed attestations on images☆13Updated last year
- Go beyond package manager discovery for SBOM☆18Updated 3 years ago
- Sigstore user stories☆30Updated 2 years ago
- Kubernetes security scanner based on the open-source container vulnerability scanner Trivy.☆23Updated 4 years ago
- ☆33Updated 7 months ago
- ☆23Updated 2 years ago
- ☆57Updated 3 years ago
- Container image provenance spec that allows tracing CVEs detected in registry images back to a CVE's source of origin.☆43Updated last year
- Integrates Spiffe and Vault to have secretless authentication☆92Updated this week
- The Container Security Book—a free book for practitioners☆82Updated 5 years ago
- Open Policy Agent WebAssembly Go SDK☆21Updated 2 years ago
- Inspect SSL/TLS traffic using eBPF☆19Updated 10 months ago
- replace a k8s deployment by a proxy to a pod in another cluster☆10Updated 4 years ago
- Transparenty Immutable Container Image Tags☆20Updated 2 years ago
- Kubernetes admission webhook that uses cosign verify to check the subject and issuer of the image matches what you expect☆23Updated 2 weeks ago
- This tool allows using a SPIFFE JWT to authenticate to AWS APIs☆34Updated last month
- Go implementation of witness☆37Updated this week
- Example goreleaser + github actions config with keyless signing, SBOM generation, and attestations☆58Updated last week
- To manage Docker Content Trust and Notary certificates☆13Updated last week
- ☆20Updated 3 months ago
- Terraform IAC for K3S on AWS☆16Updated 4 years ago
- A highly configurable build executor and observer designed to generate signed SLSA provenance attestations about build runs.☆65Updated this week
- Container Snitch checks running processes under the Docker Engine and alerts if any are found to be running as root☆78Updated 8 years ago
- 🔍 Rekor transparency log monitoring and alerting☆27Updated last year
- Generate seccomp profiles from go binaries☆135Updated 7 years ago