Supply-chain Levels for Software Artifacts
-
Updated
May 23, 2024 - Shell
Supply-chain Levels for Software Artifacts
Tern is a software composition analysis tool and Python library that generates a Software Bill of Materials for container images and Dockerfiles. The SBOM that Tern generates will give you a layer-by-layer view of what's inside your container in a variety of formats including human-readable, JSON, HTML, SPDX and more.
GUAC aggregates software security metadata into a high fidelity graph database.
OWASP dep-scan is a next-generation security and risk audit tool based on known vulnerabilities, advisories, and license limitations for project dependencies. Both local repositories and container images are supported as the input, and the tool is ideal for integration.
Detect and remediate misconfigurations and security risks across all your GitHub and GitLab assets
Network egress filtering and runtime security for GitHub-hosted and self-hosted runners
Orchestrate GitHub Actions Security
Packj stops ⚡ Solarwinds-, ESLint-, and PyTorch-like attacks by flagging malicious/vulnerable open-source dependencies ("weak links") in your software supply-chain
Docker Scout GitHub Action
BLint is a Binary Linter to check the security properties, and capabilities in your executables. Since v2, blint is also an SBOM generator for binaries.
JavaScript & Node.js open-source SAST scanner. A static analyser for detecting most common malicious patterns 🔬.
Catalogue all images of a Kubernetes cluster to multiple targets with Syft
A compilation of resources in the software supply chain security domain, with emphasis on open source
Chainloop is an Open Source evidence store for your Software Supply Chain attestations, SBOMs, VEX, SARIF, CSAF files, QA reports, and more.
Independent verification of binary packages - reproducible builds
scans popular packages and alerts in cases there is suspicion of an account takeover
Macaron is an extensible supply-chain security analysis framework from Oracle Labs that supports a wide range of build systems and CI/CD services. It can be used to prevent supply chain attacks or check conformance to frameworks, such as SLSA.
Tool to achieve policy driven vetting of open source dependencies
boostsecurityio/poutine
Add a description, image, and links to the supply-chain-security topic page so that developers can more easily learn about it.
To associate your repository with the supply-chain-security topic, visit your repo's landing page and select "manage topics."