There are 9 repositories under supply-chain-security topic.
OWASP dep-scan is a next-generation security and risk audit tool based on known vulnerabilities, advisories, and license limitations for project dependencies. Both local repositories and container images are supported as the input, and the tool is ideal for integration.
Tern is a software composition analysis tool and Python library that generates a Software Bill of Materials for container images and Dockerfiles. The SBOM that Tern generates will give you a layer-by-layer view of what's inside your container in a variety of formats including human-readable, JSON, HTML, SPDX and more.
Detect and remediate misconfigurations and security risks across all your GitHub and GitLab assets
Harden-Runner is a CI/CD security agent that works like an EDR for GitHub Actions runners. It monitors network egress, file integrity, and process activity on those runners, detecting threats in real-time.
Packj stops :zap: Solarwinds-, ESLint-, and PyTorch-like attacks by flagging malicious/vulnerable open-source dependencies ("weak links") in your software supply-chain
Evidence store for your Software Supply Chain attestations, SBOMs, VEX, SARIF, QA reports, and more
Independent verification of binary packages - Reproducible Builds
BLint is a Binary Linter to check the security properties, and capabilities in your executables. Since v2, blint is also an SBOM generator for binaries.
A compilation of resources in the software supply chain security domain, with emphasis on open source
Developer-centric tool to secure your software supply chain.
Orchestrate GitHub Actions Security
boostsecurityio/poutine
JavaScript & Node.js open-source SAST scanner. A static analyser for detecting most common malicious patterns 🔬.
Catalogue all images of a Kubernetes cluster to multiple targets with Syft
SBOM quality score - Quality metrics for your sboms
Macaron is an extensible supply-chain security analysis framework from Oracle Labs that supports a wide range of build systems and CI/CD services. It can be used to prevent supply chain attacks, detect malicious Python packages, or check conformance to frameworks, such as SLSA. Documentation:
A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling, books, articles and a plethora of learning resources from the web.
Template Go app repo with local test/lint/build/vulnerability check workflow, and on tag image test/build/release pipelines, with ko generative SBOM, cosign attestation, and SLSA build provenance
Focused malicious code detection ruleset, with a high protection-to-noise ratio
Runtime Security Solution for your CI/CD Pipeline
Experimental pacman integration for Reproducible Builds and Binary Transparency (with sigstore/rekor)
Analyze any snippet, file, or repository to detect possible security flaws such as secret in code, open source vulnerability, code security, vulnerability, insecure infrastructure as code, and potential legal issues with open source licenses.
Reproduces WordPress builds and verifies that the official and unofficial packages haven't been tampered with.