reposaur
secure-repo
reposaur | secure-repo | |
---|---|---|
4 | 6 | |
280 | 236 | |
0.4% | 2.1% | |
0.0 | 2.8 | |
6 months ago | about 1 month ago | |
Go | Go | |
MIT License | GNU Affero General Public License v3.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
reposaur
- Reposaur – open-source compliance tool for development platforms
- Reposaur
- reposaur - use Rego to audit your GitHub org security posture
-
Reposaur: audit your GitHub organization and repositories with custom policies
If you want to have a look, head to: https://github.com/reposaur/reposaur (it's fairly new and being actively developed)
secure-repo
-
Show HN: Secure your public GitHub repository with automated security fixes
I am excited to share Secure-Repo, an open-source project that can easily secure your GitHub repository through automated security fixes. The project aims to automate common security fixes, so developers do not have to wade through documentation.
It does not require any App installation or onboarding steps, you can just enter your public repository and click on a button to improve security through automated pull requests.
I invite you to try Secure-Repo on your public repository using the hosted version at http://app.stepsecurity.io/securerepo and share your feedback.
Important open-source repositories have adopted the tool. Here are a few example pull requests created by the maintainers of Electron, Ruby, and GoogleCloudPlatform using this project.
Electron: https://github.com/electron/electron/pull/36363
-
Securing a GitHub repo is a ton of work
I've found StepSecurity's tooling helpful in getting my repos secured.
* https://app.stepsecurity.io/securerepo
-
Do you maintain a GitHub Action? Contribute to the SecureWorkflows project!
The problem we are trying to solve is to automatically calculate what the minimum GITHUB_TOKEN permissions should be for a given workflow. We are solving this problem by building a knowledge base of permissions needed by each GitHub Action. If you own a GitHub Action, contribute to the SecureWorkflows project by adding a YAML file describing the permissions your Action needs.
-
StepSecurity releases tool that it used to improve security of 30 critical open-source projects (including NodeJS, OpenSSL, Python, Rails, React Native)
List of merged pull requests for the 30 critical projects can be found here: https://github.com/step-security/secure-workflows/issues/462
- Secure GitHub Actions workflows by automatically updating the workflow (YAML) files
What are some alternatives?
rego-policies - Rego policies collection
machine - Machine is a workflow/pipeline library for processing data
gke-policy-automation - Tool and policy library for reviewing Google Kubernetes Engine clusters against best practices
DnsControl - Infrastructure as code for DNS!
o365beat - Elastic Beat for fetching and shipping Office 365 audit events
Beehive - A flexible event/agent & automation system with lots of bees 🐝
xpid - Linux Process Discovery. C Library, Go bindings, Runtime.
mysql-actions - MySQL Actions
imdb-trakt-sync - Automatic sync from IMDb to Trakt (watchlist, lists, ratings and history) using GitHub actions.
functions-framework-dotnet - FaaS (Function as a service) framework for writing portable .NET functions
Gravitational Teleport - The easiest, and most secure way to access and protect all of your infrastructure.
slsa-provenance-action - Github Action implementation of SLSA Provenance Generation