documentation VS oci-seccomp-bpf-hook

Compare documentation vs oci-seccomp-bpf-hook and see what are their differences.

documentation

Kata Containers version 1.x documentation (for version 2.x see https://github.com/kata-containers/kata-containers). (by kata-containers)

oci-seccomp-bpf-hook

OCI hook to trace syscalls and generate a seccomp profile (by containers)
Our great sponsors
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • WorkOS - The modern identity platform for B2B SaaS
  • SaaSHub - Software Alternatives and Reviews
documentation oci-seccomp-bpf-hook
5 2
454 283
- 1.1%
6.1 7.0
almost 3 years ago 3 days ago
Shell Go
Apache License 2.0 Apache License 2.0
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

documentation

Posts with mentions or reviews of documentation. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2022-03-16.

oci-seccomp-bpf-hook

Posts with mentions or reviews of oci-seccomp-bpf-hook. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2022-03-31.
  • Securing Containers with Seccomp: Part 1
    2 projects | dev.to | 31 Mar 2022
    I was thinking about how to solve that problem, and I thought of an idea: “What if we record the syscalls that a program makes while it’s running?” I was telling one of my co-workers about my idea, and the next day he sent me a link to a tool he found on GitHub. It turned out that some folks at Red Hat had already made a tool called oci-seccomp-bpf-hook that does exactly what I wanted!
  • Kubernetes Security Checklist 2021
    28 projects | dev.to | 18 Oct 2021
    The application should have a seccomp, apparmor or selinux profile according to the principles of least privileges (Udica, Oci-seccomp-bpf-hook, Go2seccomp, Security Profiles Operator)

What are some alternatives?

When comparing documentation and oci-seccomp-bpf-hook you can also consider the following projects:

grype - A vulnerability scanner for container images and filesystems

kubevirt - Kubernetes Virtualization API and runtime in order to define and manage virtual machines.

falco - Cloud Native Runtime Security

simplenetes - The sns tool is used to manage the full life cycle of your Simplenetes clusters. It integrates with the Simplenetes Podcompiler project podc to compile pods.

hadolint - Dockerfile linter, validate inline bash, written in Haskell

krane - Kubernetes RBAC static analysis & visualisation tool

kube-bench - Checks whether Kubernetes is deployed according to security best practices as defined in the CIS Kubernetes Benchmark

cvehound - Check linux sources dump for known CVEs.

checkov - Prevent cloud misconfigurations and find vulnerabilities during build-time in infrastructure as code, container images and open source packages with Checkov by Bridgecrew.

lynis - Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.

trivy - Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more