certspotter VS osv.dev

Compare certspotter vs osv.dev and see what are their differences.

InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
certspotter osv.dev
4 19
918 1,411
1.1% 2.3%
6.9 9.7
about 1 month ago 5 days ago
Go Python
Mozilla Public License 2.0 Apache License 2.0
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

certspotter

Posts with mentions or reviews of certspotter. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-11-02.
  • SSLMate/Certspotter: Certificate Transparency Log Monitor
    1 project | news.ycombinator.com | 2 Nov 2023
  • Last Chance to Fix EIDAS (Mozilla)
    2 projects | news.ycombinator.com | 2 Nov 2023
    > 1. Is this proactively monitored for? And how? And by whom?

    Yes, security researchers and domain owners use Certificate Transparency Monitors to search for certificates. e.g.:

    https://crt.sh/ - allows you to search for certificates for a domain

    https://github.com/SSLMate/certspotter/ - open source tool which notifies you when a certificate is issued for one of your domains

    https://sslmate.com/certspotter/ - commercial service that does the same, operated by my company

    > 2. If a major state-level CA was discovered to have issued a mitm cert, would browser vendors really take the commercial hit of removing or distrusting their root cert?

    In 2017, Chrome and Firefox distrusted Symantec, which was at the time the world's largest certificate authority: https://security.googleblog.com/2017/09/chromes-plan-to-dist...

    Symantec hadn't even issued MitM certs - they were just grossly incompetent. Distrusting them was very painful, but necessary to upload the integrity of the CA system, and demonstrated conclusively that there is no such thing as a too-big-to-fail CA.

  • Encrypted traffic interception on Hetzner and Linode targeting Jabber service
    3 projects | news.ycombinator.com | 20 Oct 2023
    Indeed, a CT monitor which sends alerts about legitimate certificates is pretty much useless due to noise. My service, Cert Spotter, provides an API endpoint[1] which you can upload your CSRs to, so you don't get alerted about certificates using the same key as the CSR. The open source version of Cert Spotter can invoke a script[2] when a certificate is discovered, and the script can cross reference against a list of legitimate certs.

    [1] https://sslmate.com/help/reference/certspotter_authorization...

    [2] https://github.com/SSLMate/certspotter/blob/master/man/certs...

  • Google's Certificate Transparency Search page to be discontinued May 15th, 2022
    4 projects | news.ycombinator.com | 23 Mar 2022

osv.dev

Posts with mentions or reviews of osv.dev. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2024-02-15.
  • Magika: AI powered fast and efficient file type identification
    15 projects | news.ycombinator.com | 15 Feb 2024
    Is it safe to assume that hashing (1) every file on disk, or (2) any given file on disk at random, will yield random bits with uniform probability; and (3) why Argon2 instead of e.g. only two rounds of SHA256?

    https://github.com/google/osv.dev/blob/master/README.md#usin... :

    > We provide a Go based tool that will scan your dependencies, and check them against the OSV database for known vulnerabilities via the OSV API. ... With package metadata, not (a file hash, package) database that could be generated from OSV and the actual package files instead of their manifest of already-calculated checksums.

    Might as well be heating a pool on the roof with all of this waste heat from hashing binaries build from code of unknown static and dynamic quality.

    Add'l useful formats:

    > Currently it is able to scan various lockfiles, debian docker containers, SPDX and CycloneDB SBOMs, and git repositories

  • Dependabot vs RenovateBot
    2 projects | /r/golang | 27 Jun 2023
    Also it supports an alternative sources of CVEs with https://osv.dev
  • Pyscan: A command-line tool to detect security issues in your python dependencies.
    2 projects | /r/Python | 17 May 2023
    https://osv.dev its open source and even has a free API with almost all the popular languages. One of the inspirations for my project.
  • Announcing Pyscan: A dependency vulnerability scanner for python projects.
    3 projects | /r/u_aswin__ | 15 May 2023
    pyscan uses OSV as its database for now. There are plans to add a few more.
  • We should start to add “ai.txt” as we do for “robots.txt”
    7 projects | news.ycombinator.com | 10 May 2023
    JSON-LD or RDFa (RDF in HTML attributes) in at least the /index.html the HTML footer should be sufficient to indicate that there is structured linked data metadata for crawlers that then don't need an HTTP request to a .well-known URL /.well-known/ai_security_reproducibility_carbon.txt.jsonld.json

    OSV is a new format for reporting security vulnerabilities like CVEs and an HTTP API for looking up CVEs from software component name and version. https://github.com/google/osv.dev#third-party-tools-and-inte... :

    > We provide a Go based tool that will scan your dependencies, and check them against the OSV database for known vulnerabilities via the OSV API.

    > Currently it is able to scan various lockfiles, -- (repo2docker REES config files) -- debian docker containers, SPDX and CycloneDB SBOMs, and git repositories.

  • Ask HN: Most interesting tech you built for just yourself?
    149 projects | news.ycombinator.com | 27 Apr 2023
    Something I've recently worked on is building an SQLite database of all the dependencies my organisation uses, which makes it possible to write our own queries and reports. The tool is all Open Source (https://dmd.tanna.dev) and has a CLI as well as the SQLite data.

    Ive used it to look for software that's out of date (via https://endoflife.date), to find vulnerablilities (via https://osv.dev) and get license information (via https://deps.dev)

    It's been hugely useful for us understanding use of internal and external dependencies, and I wish I'd built it earlier in my career so I could've had it for other companies I've worked at!

  • Malicious library inits?
    2 projects | /r/golang | 15 Jan 2023
    Something like osv-scanner (https://osv.dev/), Github's depandabot etc would help to a great extend in detecting malicious dependencies. Not much else be done I guess
  • Distributed vulnerability database for Open Source
    1 project | news.ycombinator.com | 3 Jan 2023
  • SBOM and dependencies check tool and vulnerabilities database from Google
    3 projects | /r/cybersecurity | 28 Dec 2022
  • Free tool for generating SBOM and CVEs against source or binaries
    3 projects | /r/cybersecurity | 21 Dec 2022
    Have a look at https://security.googleblog.com/2022/12/announcing-osv-scanner-vulnerability.html they have plans for c++ https://github.com/google/osv.dev/issues/783

What are some alternatives?

When comparing certspotter and osv.dev you can also consider the following projects:

certificates - 🛡️ A private certificate authority (X.509 & SSH) & ACME server for secure automated certificate management, so you can use TLS everywhere & SSO for SSH.

osv-scanner - Vulnerability scanner written in Go which uses the data provided by https://osv.dev

check_ssl_cert - A shell script (that can be used as a Nagios/Icinga plugin) to check an SSL/TLS connection.

betterscan-ce - Code Scanning/SAST/Static Analysis/Linting using many tools/Scanners + OpenAI GPT with One Report (Code, IaC) - Betterscan Community Edition (CE)

acmetool - :lock: acmetool, an automatic certificate acquisition tool for ACME (Let's Encrypt)

certificate-transparency-go - Auditing for TLS certificates (Go code)

rap - Raspberry Pi RIPE Atlas Probe

Awesome-Fuzzing - A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Development like root cause analysis.

tincan-tls - A cleanroom implementation of TLS 1.3

notebooks - Just various notebooks I sometimes write to help me, no unifying theme

Botan - Cryptography Toolkit