in-toto VS dependency-track

Compare in-toto vs dependency-track and see what are their differences.

InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
in-toto dependency-track
4 18
827 2,329
0.8% 2.8%
8.9 9.8
9 days ago 7 days ago
Python Java
GNU General Public License v3.0 or later Apache License 2.0
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

in-toto

Posts with mentions or reviews of in-toto. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-11-14.
  • UEFI Software Bill of Materials Proposal
    8 projects | news.ycombinator.com | 14 Nov 2023
    The things you mentioned are not solved by a typical "SBOM" but e.g. CycloneDX has extra fields to record provenance and pedigree and things like in-toto (https://in-toto.io/) or SLSA (https://slsa.dev/) also aim to work in this field.

    I've spent the last six months in this field and people will tell you that this or that is an industry best practice or "a standard" but in my experience none of that is true. Everyone is still trying to figure out how best to protect the software supply chain security and things are still very much in flux.

  • An Overview of Kubernetes Security Projects at KubeCon Europe 2023
    17 projects | dev.to | 22 May 2023
    in-toto is an open source project that focuses on the attestation part of software supply chain security. You use it to define a “layout” for a project, i.e., how the different components should fit together. A project ships this definition with its code, and then another user of that software can compare what they have with the attached definition to see if it matches the structure and contents they expect. If it doesn’t, then this could point to external tampering or other issues.
  • How do you mitigate supply chain attacks?
    3 projects | /r/node | 12 Sep 2021
    But it's not all doom and gloom because the industry is evolving. Companies like Google are formulating tools like scorecard to heuristically reduce risk by encouraging you to rely on trustable dependencies only. There's also more complex tools like in-toto that actually look at the integrity of your supply chain (don't ask me how this one works, I just know that people like it).
  • in-toto/in-toto: in-toto is a framework to protect supply chain integrity.
    1 project | /r/devopsish | 4 Mar 2021

dependency-track

Posts with mentions or reviews of dependency-track. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2024-04-21.
  • Show HN: Pre-alpha tool for analyzing spdx SBOMs generated by GitHub
    3 projects | news.ycombinator.com | 21 Apr 2024
    I've become interested in SBOM recently, and found there were great tools like https://dependencytrack.org/ for CycloneDX SBOMs, but all I have is SPDX SBOMs generated by GitHub.

    I decided to have a go at writing my own dependency track esque tool aiming to integrate with the APIs GitHub provides.

    It's pretty limited in functionality so far, but can give a high level summary of the types of licenses your repository dependencies use, and let you drill down into potentially problematic ones.

    Written in NextJS + mui + sqlite, and using another project of mine to generate most of the API boilerplate/glue (https://github.com/mnahkies/openapi-code-generator)

  • SQL Injection Isn't Dead Yet
    2 projects | dev.to | 15 Apr 2024
    To detect these types of vulnerabilities, we should first and foremost know our dependencies and versions, and which of them have vulnerabilities. The OWASP Top 10 2021 identifies this need as A06:2021-Vulnerable and Outdated Components. OWASP has several tools for this, including Dependency Check and Dependency Track. These tools will warn about the use of components with vulnerabilities.
  • Dependency-Track
    1 project | news.ycombinator.com | 27 Oct 2023
  • Krita fund has 0 corporate support
    7 projects | news.ycombinator.com | 5 Oct 2023
    https://dependencytrack.org/

    You just need to use one of the various tools out there to scan.

  • Friends - needs help choosing solution for SBOM vulnerability
    2 projects | /r/devops | 1 Jun 2023
    OWASP Dependency Track - https://dependencytrack.org/
  • An Overview of Kubernetes Security Projects at KubeCon Europe 2023
    17 projects | dev.to | 22 May 2023
    Dependency-Track
  • software inventory of my ECS tasks
    2 projects | /r/aws | 21 Jan 2023
    I actually want to build the same thing you are after, and I think I’ll go for the setup you describe in idea 2. The tool you can use for this is Trivy (https://trivy.dev), have it generate a SBOM and send it to Dependencytrack (https://dependencytrack.org).
  • The ultimate guide to Java Security Vulnerabilities (CVE)
    2 projects | /r/java | 29 Dec 2022
    If you like Dependency-Track, consider moving to Dependency-Track ( https://dependencytrack.org ), which makes administration much easier.
  • Is there any news about 64 bit Steam?
    1 project | /r/linux_gaming | 26 Nov 2022
    Even if you roll up the sleeves and add the feature yourself there is no guarantee it will be accepted upstream and you should always be prepared for the possibility of wasting time.
  • The SBOM Frenzy Is Premature
    1 project | news.ycombinator.com | 5 Oct 2022
    I don't quite understand the deployment issue. I mean, I understand people might not be tracking what's deployed, but I don't understand what is missing for it to be happening today, other than will.

    For example: I build some software into a Docker image, version tag it, sign it, and generate an SBOM for it. That image goes into production with signature validation. Even if I've included 100 jar files in there, I should know exactly which ones I have. I can upload the SBOM to my DependencyTrack[1] instance to so over time no dependencies have vulnerabilities I'm not aware of.

    What doesn't work in that scenario? What scenarios can't conform to that one?

    [1] https://dependencytrack.org

What are some alternatives?

When comparing in-toto and dependency-track you can also consider the following projects:

snyk - Snyk CLI scans and monitors your projects for security vulnerabilities. [Moved to: https://github.com/snyk/cli]

trivy - Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more

scorecard - OpenSSF Scorecard - Security health metrics for Open Source

DependencyCheck - OWASP dependency-check is a software composition analysis utility that detects publicly disclosed vulnerabilities in application dependencies.

ochrona-cli - A command line tool for detecting vulnerabilities in Python dependencies and doing safe package installs

scancode-toolkit - :mag: ScanCode detects licenses, copyrights, dependencies by "scanning code" ... to discover and inventory open source and third-party packages used in your code. Sponsored by NLnet project https://nlnet.nl/project/vulnerabilitydatabase, the Google Summer of Code, Azure credits, nexB and others generous sponsors!

pip-audit - Audits Python environments, requirements files and dependency trees for known security vulnerabilities, and can automatically fix them

gitlab

macOS-Security-and-Privacy-Guide - Guide to securing and improving privacy on macOS

sbt-dependency-check - SBT Plugin for OWASP DependencyCheck. Monitor your dependencies and report if there are any publicly known vulnerabilities (e.g. CVEs). :rainbow:

i-probably-didnt-backdoor-this - A practical experiment on supply-chain security using reproducible builds

ort - A suite of tools to automate software compliance checks.