A tool to automatically build a dependency graph and Software Bill of Materials (SBOM) for packages and arbitrary source code repositories.
☆386Mar 19, 2026Updated this week
Alternatives and similar repositories for it-depends
Users that are interested in it-depends are comparing it to the libraries listed below
Sorting:
- Compares and analyzes GCP IAM roles.☆78Mar 9, 2025Updated last year
- A curated list of SBOM (Software Bill Of Materials) related tools, frameworks, blogs, podcasts, and articles☆572May 20, 2025Updated 10 months ago
- Exit if environment variables known to be used as access tokens are set.☆15May 30, 2022Updated 3 years ago
- Generate a score for your sbom to understand if it will actually be useful.☆239Aug 13, 2024Updated last year
- Scans Software Bill of Materials (SBOMs) for security vulnerabilities☆606Feb 10, 2026Updated last month
- Semgrep queries developed by Trail of Bits.☆485Nov 12, 2025Updated 4 months ago
- ☆25Sep 17, 2023Updated 2 years ago
- A place to systematically store software bill of materials (SBOM) documents.☆50Jun 1, 2023Updated 2 years ago
- GuardDog is a CLI tool to Identify malicious PyPI and npm packages☆1,017Updated this week
- Witness is a pluggable framework for software supply chain risk management. It automates, normalizes, and verifies software artifact pro…☆519Updated this week
- Kubernetes admission webhook that uses cosign verify to check the subject and issuer of the image matches what you expect☆24Feb 19, 2026Updated last month
- Tool for collecting vulnerability data from various sources (used to build the grype database)☆114Updated this week
- An open-source tool for auditing your software supply chain stack for security compliance based on a new CIS Software Supply Chain benchm…☆770Dec 11, 2024Updated last year
- GUAC aggregates software security metadata into a high fidelity graph database.☆1,454Updated this week
- all paths lead to clouds☆639Oct 11, 2023Updated 2 years ago
- A reading list for software supply-chain security.☆365Nov 21, 2022Updated 3 years ago
- App that simplifies building decision trees to model adverse scenarios☆228Jul 11, 2024Updated last year
- ☆76Dec 10, 2025Updated 3 months ago
- Website for OmniBOR, reproducible identifiers & fine-grained build dependency tracking for software artifacts.☆21Jan 27, 2025Updated last year
- Submit SBOMs to GitHub's dependency submission API☆18Dec 4, 2025Updated 3 months ago
- Threat matrix for CI/CD Pipeline☆759Jul 8, 2024Updated last year
- Library to ingest and generate SBOMs☆39Updated this week
- A standard API specification for exchanging supply chain artifacts and intelligence☆103Mar 13, 2026Updated last week
- ☆69Jul 18, 2025Updated 8 months ago
- Audits Python environments, requirements files and dependency trees for known security vulnerabilities, and can automatically fix them☆1,217Updated this week
- OpenSSF Scorecard - Security health metrics for Open Source☆5,315Updated this week
- This repo. is archived. The utility is now at: https://github.com/CycloneDX/sbom-utility☆60Apr 17, 2023Updated 2 years ago
- GitHub App to set and enforce security policies☆1,394Updated this week
- Scans every git push to your Github organisations to find unwanted secrets.☆87May 1, 2025Updated 10 months ago
- Supply-chain Levels for Software Artifacts☆1,823Mar 11, 2026Updated last week
- A community collection of security reviews of open source software components.☆98Feb 29, 2024Updated 2 years ago
- This repo is a consolidation of Secure Software Supply Chain resources, such as talks, whitepapers, conferences and more.☆139Jul 12, 2022Updated 3 years ago
- A suite of tools to automate software compliance checks.☆1,968Updated this week
- ☆114Jun 8, 2023Updated 2 years ago
- OpenVEX Specification☆169Jan 16, 2026Updated 2 months ago
- Open source vulnerability DB and triage service.☆2,530Updated this week
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆339Updated this week
- This repo has been replaced by https://www.cloudvulndb.org☆727Jun 29, 2022Updated 3 years ago
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆81Updated this week