testifysec / witness-examplesLinks
Witness Examples
☆11Updated last year
Alternatives and similar repositories for witness-examples
Users that are interested in witness-examples are comparing it to the libraries listed below
Sorting:
- Tooling and library for generation, validation and verification of supply chain metadata documents and frameworks☆31Updated last month
- Go implementation of witness☆37Updated this week
- vexctl is a tool to attest VEX impact statements☆44Updated 2 years ago
- Software Supply Chain Attribute Integrity (SCAI) Demos and CLI tools☆18Updated 2 weeks ago
- A highly configurable build executor and observer designed to generate signed SLSA provenance attestations about build runs.☆62Updated last week
- Archivista is a graph and storage service for in-toto attestations. Archivista enables the discovery and retrieval of attestations for so…☆97Updated last week
- ☆56Updated 3 years ago
- ☆20Updated this week
- 🔍 Rekor transparency log monitoring and alerting☆27Updated last year
- Go implementation of The Update Framework heavily influenced by python-tuf☆14Updated last year
- Stuff to make standing up sigstore (esp. for testing) easier for e2e/integration testing.☆64Updated this week
- Supply Chain Query Tool☆13Updated 3 years ago
- Example goreleaser + github actions config with keyless signing, SBOM generation, and attestations☆58Updated 2 weeks ago
- Sigstore user stories☆30Updated last year
- A CLI used to work with the Wolfi OSS project☆62Updated this week
- A Go implementation of in-toto. in-toto is a framework to protect software supply chain integrity.☆136Updated last week
- Go implementation for CNAB content trust verification using TUF, Notary, and in-toto☆31Updated last year
- A TUF repository and signing tool☆35Updated this week
- Friends of in-toto! A place to record integrations and adoptions of the in-toto specification.☆16Updated last week
- A specification for signing methods and formats used by Secure Systems Lab projects.☆78Updated 8 months ago
- go-ima is a tool that checks if a file has been tampered with. It is useful in ensuring integrity in CI systems☆13Updated last year
- Keyless Git signing with cosign!☆11Updated 3 years ago
- Go module to generate and transform VEX documents☆41Updated 2 weeks ago
- sigstore the hard way!☆111Updated last year
- ☆23Updated 2 years ago
- ☆11Updated 2 years ago
- ☆62Updated 10 months ago
- An http proxy for reproducibility.☆19Updated 2 years ago
- Trust Dexter to ensure that all your images are pinned by digest for better security☆29Updated last year
- ☆15Updated last month