{"payload":{"pageCount":2,"repositories":[{"type":"Public","name":"env-variable-secrets-scanner-policy","owner":"kubewarden","isFork":false,"description":"A Kubewarden Policy that detects secrets (ssh private keys, API tokens, etc) leaked via environment variables","allTopics":["kubernetes","webassembly","hacktoberfest","policy-as-code","kubernetes-security","kubewarden-policy"],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":0,"issueCount":1,"starsCount":5,"forksCount":3,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-04T12:27:31.958Z"}},{"type":"Public","name":"policy-server","owner":"kubewarden","isFork":false,"description":"Webhook server that evaluates WebAssembly policies to validate Kubernetes requests","allTopics":["rust","webassembly","policy","hacktoberfest","policy-as-code","kubernetes-webhook","kubernetes-security","kubernetes"],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":6,"issueCount":11,"starsCount":131,"forksCount":16,"license":"Apache License 2.0","participation":[4,4,8,10,4,11,12,17,9,4,1,6,10,12,15,10,6,10,4,15,18,9,5,11,14,14,5,18,4,7,8,21,12,11,14,7,16,5,20,12,29,13,5,16,14,18,8,6,6,12,18,16],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-04T14:59:21.882Z"}},{"type":"Public","name":"policy-fetcher","owner":"kubewarden","isFork":false,"description":"Crate used by Kubewarden that is able to pull policies from OCI registries and HTTP servers.","allTopics":["kubernetes","webassembly","hacktoberfest","policy-as-code","kubernetes-security"],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":0,"issueCount":5,"starsCount":8,"forksCount":8,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-04T07:00:50.034Z"}},{"type":"Public","name":"kwctl","owner":"kubewarden","isFork":false,"description":"Go-to CLI tool for Kubewarden users","allTopics":["webassembly","hacktoberfest","policy-as-code","kubernetes-security","kubernetes"],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":1,"issueCount":16,"starsCount":70,"forksCount":15,"license":"Apache License 2.0","participation":[8,5,7,7,13,10,8,11,17,18,5,19,20,13,11,10,6,15,10,9,19,14,9,10,9,4,6,8,3,7,11,15,7,14,13,9,14,5,17,7,14,14,8,15,20,16,13,6,8,12,17,15],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-04T14:59:04.829Z"}},{"type":"Public","name":"policy-evaluator","owner":"kubewarden","isFork":false,"description":"Crate used by Kubewarden that is able to evaluate policies with a given input, request to evaluate and settings.","allTopics":["hacktoberfest"],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":0,"issueCount":21,"starsCount":14,"forksCount":8,"license":"Apache License 2.0","participation":[3,2,4,0,3,14,4,10,9,0,1,5,11,13,4,11,0,0,6,17,14,7,0,12,23,4,4,10,1,2,10,12,4,19,12,9,10,9,12,9,5,5,8,15,7,6,7,9,5,11,7,14],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-04T07:00:40.473Z"}},{"type":"Public","name":"gtmpl-rust","owner":"kubewarden","isFork":true,"description":"golang text/template for rust","allTopics":["hacktoberfest"],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":12,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-03T13:30:27.863Z"}},{"type":"Public","name":"user-group-psp-policy","owner":"kubewarden","isFork":false,"description":"This Kubewarden Policy is a replacement for the Kubernetes Pod Security Policy that controls containers user and groups","allTopics":["webassembly","hacktoberfest","policy-as-code","pod-security-policy","kubernetes-security","kubewarden-policy","kubernetes"],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":0,"issueCount":3,"starsCount":7,"forksCount":4,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-03T07:15:03.195Z"}},{"type":"Public","name":"unique-service-selector-policy","owner":"kubewarden","isFork":false,"description":"Policy validates that there are no services with the same set of selectors","allTopics":["kubernetes","webassembly","hacktoberfest","policy-as-code","kubernetes-security","kubewarden-policy"],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":0,"issueCount":1,"starsCount":0,"forksCount":1,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-03T07:14:52.645Z"}},{"type":"Public","name":"trusted-repos-policy","owner":"kubewarden","isFork":false,"description":"A Kubewarden policy that restricts what registries, tags and images can pods on your cluster refer to","allTopics":["webassembly","hacktoberfest","policy-as-code","kubernetes-security","kubernetes-compliance","kubewarden-policy","kubernetes"],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":1,"issueCount":3,"starsCount":5,"forksCount":3,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-03T07:14:36.799Z"}},{"type":"Public","name":"sleeping-policy","owner":"kubewarden","isFork":false,"description":"A test policy that simulates long running policy evaluations","allTopics":["kubernetes","webassembly","hacktoberfest","policy-as-code","kubernetes-security","kubewarden-policy"],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":0,"issueCount":1,"starsCount":0,"forksCount":2,"license":"Apache License 2.0","participation":[0,0,0,0,5,0,0,2,2,1,0,0,1,0,0,0,0,0,2,0,2,2,0,0,0,0,0,0,3,1,0,0,2,0,2,2,2,2,0,0,2,0,0,0,2,0,0,2,2,2,0,6],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-03T07:14:24.390Z"}},{"type":"Public","name":"share-pid-namespace-policy","owner":"kubewarden","isFork":false,"description":"Policy validates pods sharing processes PID namespace","allTopics":["kubernetes","webassembly","hacktoberfest","policy-as-code","kubernetes-security","kubewarden-policy"],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":0,"issueCount":1,"starsCount":0,"forksCount":1,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-03T07:14:07.060Z"}},{"type":"Public","name":"selinux-psp-policy","owner":"kubewarden","isFork":false,"description":"Replacement for the Kubernetes Pod Security Policy that controls the usage of SELinux","allTopics":["kubernetes","webassembly","hacktoberfest","policy-as-code","pod-security-policy","kubernetes-security","kubewarden-policy"],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":0,"issueCount":3,"starsCount":1,"forksCount":3,"license":"Apache License 2.0","participation":[0,0,0,0,3,0,0,2,3,1,0,0,2,2,4,0,0,0,3,0,2,2,0,0,0,0,0,0,1,1,0,0,2,2,2,2,2,2,0,0,2,0,0,0,0,0,0,2,2,2,1,3],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-03T07:13:10.232Z"}},{"type":"Public","name":"verify-image-signatures","owner":"kubewarden","isFork":false,"description":"A Kubewarden Policy that verifies all the signatures of the container images referenced by a Pod","allTopics":["kubernetes","webassembly","hacktoberfest","policy-as-code","pod-security-policy","kubernetes-security","kubewarden-policy"],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":1,"issueCount":2,"starsCount":12,"forksCount":9,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-04T11:50:56.760Z"}},{"type":"Public","name":"seccomp-psp-policy","owner":"kubewarden","isFork":false,"description":"A Kubewarden Pod Security Policy that controls usage of Seccomp profiles","allTopics":["kubernetes","webassembly","hacktoberfest","policy-as-code","pod-security-policy","kubernetes-security","kubewarden-policy"],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":0,"issueCount":3,"starsCount":4,"forksCount":4,"license":"Apache License 2.0","participation":[0,0,0,0,3,0,0,2,3,1,0,0,1,2,4,0,0,0,3,0,3,2,0,0,0,0,0,0,1,1,0,0,4,0,2,2,2,2,0,0,2,0,0,0,0,0,0,2,2,2,1,3],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-03T07:12:16.219Z"}},{"type":"Public","name":"volumeMounts-policy","owner":"kubewarden","isFork":false,"description":"A Kubewarden Policy that controls the usage of `volumeMounts`","allTopics":["kubernetes","webassembly","hacktoberfest","policy-as-code","kubernetes-security","kubewarden-policy"],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":0,"issueCount":1,"starsCount":2,"forksCount":4,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-03T07:12:04.583Z"}},{"type":"Public","name":"pod-privileged-policy","owner":"kubewarden","isFork":false,"description":"A Kubewarden Policy that limits the ability to create privileged containers","allTopics":["webassembly","hacktoberfest","policy-as-code","pod-security-policy","kubernetes-security","kubewarden-policy","kubernetes"],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":0,"issueCount":1,"starsCount":8,"forksCount":7,"license":"Apache License 2.0","participation":[0,0,0,0,4,0,4,4,8,1,0,0,0,3,2,0,0,0,3,0,3,2,0,0,0,0,0,6,2,0,2,0,7,0,4,1,5,2,0,0,2,0,0,1,1,0,1,9,7,4,1,7],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-03T07:11:42.280Z"}},{"type":"Public","name":"readonly-root-filesystem-psp-policy","owner":"kubewarden","isFork":false,"description":"A Kubewarden policy that enforces root filesystem to be readonly","allTopics":["kubernetes","webassembly","hacktoberfest","policy-as-code","pod-security-policy","kubernetes-security","kubewarden-policy"],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":0,"issueCount":3,"starsCount":2,"forksCount":3,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-03T07:10:33.640Z"}},{"type":"Public","name":"pod-runtime-class-policy","owner":"kubewarden","isFork":false,"description":"A Kubewarden Policy that controls the usage of Pod runtimeClass","allTopics":["webassembly","hacktoberfest","policy-as-code","kubernetes-security","kubewarden-policy","kubernetes"],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":0,"issueCount":1,"starsCount":3,"forksCount":4,"license":"Apache License 2.0","participation":[0,0,0,0,3,0,0,0,0,0,0,0,0,0,2,0,0,0,0,0,6,2,0,0,0,0,0,0,1,1,0,0,3,0,2,2,2,2,0,0,2,0,0,0,2,0,0,0,5,0,0,6],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-03T07:10:21.051Z"}},{"type":"Public","name":"psa-label-enforcer-policy","owner":"kubewarden","isFork":false,"description":"Kubewarden policy that ensures that namespaces have the required PSA labels","allTopics":["kubernetes","webassembly","hacktoberfest","policy-as-code","kubernetes-security","kubewarden-policy"],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":0,"issueCount":1,"starsCount":1,"forksCount":3,"license":"Apache License 2.0","participation":[0,0,0,0,5,0,0,2,3,1,0,0,1,2,4,0,0,0,3,0,2,2,0,0,0,0,0,0,6,1,0,0,2,2,2,2,2,2,0,0,2,0,0,0,2,0,0,2,2,2,0,6],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-03T07:10:07.482Z"}},{"type":"Public","name":"persistentvolumeclaim-storageclass-policy","owner":"kubewarden","isFork":false,"description":"Policy that validates and adjusts the usage of StorageClasses in PersistentVolumeClaims","allTopics":["kubernetes","webassembly","hacktoberfest","policy-as-code","kubernetes-security","kubewarden-policy"],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":0,"issueCount":3,"starsCount":0,"forksCount":1,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-03T07:09:40.441Z"}},{"type":"Public","name":"host-namespaces-psp-policy","owner":"kubewarden","isFork":false,"description":"Replacement for the Kubernetes Pod Security Policy that controls the usage of host namespaces","allTopics":["kubernetes","webassembly","hacktoberfest","policy-as-code","pod-security-policy","kubernetes-security","kubewarden-policy"],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":0,"issueCount":3,"starsCount":1,"forksCount":4,"license":"Apache License 2.0","participation":[0,0,0,0,2,0,0,2,3,1,0,0,1,2,4,0,0,0,4,0,2,2,0,0,0,0,0,0,1,1,0,0,3,0,2,2,2,2,0,0,2,0,0,0,0,0,0,2,2,2,1,3],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-03T07:08:45.507Z"}},{"type":"Public","name":"flexvolume-drivers-psp-policy","owner":"kubewarden","isFork":false,"description":"Replacement for the Kubernetes Pod Security Policy that controls the allowed `flexVolume` drivers","allTopics":["kubernetes","webassembly","hacktoberfest","policy-as-code","pod-security-policy","kubernetes-security","kubewarden-policy"],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":0,"issueCount":3,"starsCount":1,"forksCount":3,"license":"Apache License 2.0","participation":[0,0,0,0,3,0,0,2,3,1,0,0,1,2,4,0,0,0,3,0,2,2,0,0,0,0,0,0,1,1,0,0,3,0,2,2,2,2,0,0,2,0,0,0,0,0,0,2,2,0,2,2],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-03T07:08:16.302Z"}},{"type":"Public","name":"environment-variable-policy","owner":"kubewarden","isFork":false,"description":"A Kubewarden Policy that controls the usage of environment variables","allTopics":["kubernetes","webassembly","hacktoberfest","policy-as-code","kubernetes-security","kubewarden-policy"],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":0,"issueCount":2,"starsCount":2,"forksCount":2,"license":"Apache License 2.0","participation":[0,0,0,0,3,0,0,2,2,1,0,0,1,2,2,0,0,0,3,0,2,2,0,0,0,0,0,0,1,1,0,0,3,0,2,2,2,2,0,0,2,0,0,0,0,0,0,0,5,2,1,3],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-03T07:07:53.982Z"}},{"type":"Public","name":"echo","owner":"kubewarden","isFork":false,"description":"A Kubewarden Policy that echoes Kubernetes' AdmissionReview objects","allTopics":["kubernetes","webassembly","hacktoberfest","policy-as-code","kubernetes-security","kubewarden-policy"],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":0,"issueCount":1,"starsCount":1,"forksCount":2,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-03T07:07:43.361Z"}},{"type":"Public","name":"deprecated-api-versions-policy","owner":"kubewarden","isFork":false,"description":"A Kubewarden Policy that detects usage of deprecated and dropped Kubernetes resources","allTopics":["kubernetes","webassembly","hacktoberfest","policy-as-code","kubernetes-security","kubewarden-policy"],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":0,"issueCount":1,"starsCount":15,"forksCount":3,"license":"Apache License 2.0","participation":[0,2,0,2,3,4,0,2,2,0,0,2,0,2,4,0,0,0,3,0,4,2,0,1,0,0,0,3,1,1,0,2,2,0,2,2,2,2,0,0,2,0,0,0,0,2,0,0,5,0,1,3],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-03T07:07:08.631Z"}},{"type":"Public","name":"context-aware-demo","owner":"kubewarden","isFork":false,"description":"A demo policy showing how to access Kubernetes resources at policy evaluation time","allTopics":["webassembly","hacktoberfest","policy-as-code","kubernetes-security","kubewarden-policy","kubernetes"],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":0,"issueCount":1,"starsCount":1,"forksCount":2,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-03T07:06:57.804Z"}},{"type":"Public","name":"capabilities-psp-policy","owner":"kubewarden","isFork":false,"description":"A Pod Security Policy that controls Container Capabilities","allTopics":["webassembly","hacktoberfest","policy-as-code","pod-security-policy","kubernetes-security","kubewarden-policy","kubernetes"],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":0,"issueCount":2,"starsCount":5,"forksCount":7,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-03T07:06:28.981Z"}},{"type":"Public","name":"apparmor-psp-policy","owner":"kubewarden","isFork":false,"description":"A Kubewarden Pod Security Policy that controls usage of AppArmor profiles","allTopics":["webassembly","hacktoberfest","policy-as-code","pod-security-policy","kubernetes-security","kubewarden-policy","kubernetes"],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":0,"issueCount":3,"starsCount":6,"forksCount":4,"license":"Apache License 2.0","participation":[0,0,0,0,3,0,0,2,3,1,0,0,1,2,4,0,0,0,4,0,2,2,0,0,0,0,0,0,1,1,0,0,2,2,2,2,2,2,0,0,2,0,0,0,0,0,0,2,2,2,2,2],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-03T07:06:17.236Z"}},{"type":"Public","name":"allow-privilege-escalation-psp-policy","owner":"kubewarden","isFork":false,"description":"A Kubewarden Pod Security Policy that controls usage of allowPrivilegeEscalation","allTopics":["webassembly","hacktoberfest","policy-as-code","pod-security-policy","kubernetes-security","kubewarden-policy","kubernetes"],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":0,"issueCount":2,"starsCount":5,"forksCount":7,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-03T07:06:07.468Z"}},{"type":"Public","name":"allowed-fsgroups-psp-policy","owner":"kubewarden","isFork":false,"description":"Replacement for the Kubernetes Pod Security Policy that controls the usage of fsGroup in the pod security context","allTopics":["kubernetes","webassembly","hacktoberfest","policy-as-code","pod-security-policy","kubernetes-security","kubewarden-policy"],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":0,"issueCount":3,"starsCount":4,"forksCount":5,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-03T07:05:56.600Z"}}],"repositoryCount":38,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"Repositories"}