scorecard
kaniko
scorecard | kaniko | |
---|---|---|
25 | 49 | |
4,147 | 13,925 | |
2.6% | 1.4% | |
9.7 | 9.5 | |
6 days ago | 6 days ago | |
Go | Go | |
Apache License 2.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
scorecard
-
Can some expert analyze a github repo and tell us if it's really safe or not?
For general open source hygiene, I'd recommend running OpenSSF scorecards on your github repo and following-up on anything it suggests. https://github.com/ossf/scorecard.
-
Securizing your GitHub org
The OSSF scorecard initiative is really good to assess your project against security best practices. I am not the first to write about this.
- OpenSSF Scorecard – Build better security habits, one test at a time
-
You should use the OpenSSF Scorecard
Each area has its own associated risk, so the overall score is the average of the five areas. Here, you can check the details of each by consulting the documentation in detail.
-
Software Supply Chain and Data Infrastructure Security - 5 lessons from AllDayDevOps 2022
Mitigation, according to Sean, is a combination of appropriate (network) access control, SCA (Software Composition Analysis) tooling to manage your policies around CVEs, and purging “all the things”. He also thinks MFA (multi-factor authentication) for authors of (critical) packages should be required. Sean gets his vulnerability insights from deps.dev, ossindex.sonatype, and cvedetails.com, and closely monitors interesting initiatives such as the OpenSSF Security Scorecards - a tool to assess open source projects for security risks through a series of automated checks.
- Boost Your Enterprise Security with GitHub Actions and the OSSF Score Card
- How does your company manage open-source dependencies?
-
Washington, DC, and open—for maintainers
Give feedback on new security standards: The various security standards like OpenSSF Scorecard and SLSA.dev can be a lot to digest, but they are likely going to be very influential in developing government standards. Take a peek at them, and if you have concerns or questions, file issues. The people behind them want to hear from a broad range of maintainers, so your feedback really does matter. (If you're a Tidelift maintainer partner, you can also bring the feedback to us—we are participating in these discussions, and may be able to either point to existing discussions, explain them more deeply, or bring your feedback to the appropriate places.)
-
Episode 102: myNewsWrap – SAP and Microsoft
Security Scorecards
-
Best practices for managing Java dependencies
I recommend using https://deps.dev to get a feeling for what you are bringing into your project. It also integrates with OSSF Scorecards, which gives a good overview over how healthy the project is, and whether it employs industry best practices.
kaniko
-
Using AKS for hosting ADO agent and using it to build and test as containers
If all you need to do is build container, you can use https://github.com/GoogleContainerTools/kaniko
-
Building Cages - Creating better DX for deploying Dockerfiles to AWS Nitro Enclaves
Kaniko for building the container images
-
Container and image vocabulary
kaniko
-
EKs 1.24 Docker issue
You should maybe look into Kaniko or use some other build tool
-
Schedule on Least Utilized Node
If you are using the docker socket just for building container images, you might want to look into kaniko. It doesn't use docker to build images. If you use the socket also for starting containers (we are actually doing that in our CI pipelines), you could think about limiting the pods Kubernetes schedules on a node (you can change the default of 110 using the kubelet config file).
-
Are there tools you can use to improve your docker containers like Docker Slim?
Check out Kaniko for building containers https://github.com/GoogleContainerTools/kaniko . Only issue is it doesnt support windows containers.
-
You should use the OpenSSF Scorecard
It took less than 5 minutes to install. It quickly analysed the repo and identified easy ways to make the project more secure. Priya Wadhwa, Kaniko
-
Run Docker from within AWS Lambda?
I'd suggest to take a look at the Kaniko project, combined with custom container images in Lambda functions.
-
Faster Docker image builds in Cloud Build with layer caching
kaniko is a tool that allows you to build container images inside Kubernetes without the need for the Docker daemon. Effectively, it allows you to build Docker images without docker build.
-
Switching from docker-compose to k3s - what is needed ?
Kubernetes prefers to pull containers from registries. You may be able to work around it by specifying a local image in your Kube manifest. Both https://github.com/GoogleContainerTools/kaniko and/ or https://www.devspace.sh/ may help.
What are some alternatives?
in-toto - in-toto is a framework to protect supply chain integrity.
podman - Podman: A tool for managing OCI containers and pods.
snyk - Snyk CLI scans and monitors your projects for security vulnerabilities. [Moved to: https://github.com/snyk/cli]
buildah - A tool that facilitates building OCI images.
openRiskScore - A python framework for risk scoring
buildkit - concurrent, cache-efficient, and Dockerfile-agnostic builder toolkit
cli - Snyk CLI scans and monitors your projects for security vulnerabilities.
jib - 🏗 Build container images for your Java applications.
harden-runner - Network egress filtering and runtime security for GitHub-hosted and self-hosted runners
nerdctl - contaiNERD CTL - Docker-compatible CLI for containerd, with support for Compose, Rootless, eStargz, OCIcrypt, IPFS, ...
slsa - Supply-chain Levels for Software Artifacts
skopeo - Work with remote images registries - retrieving information, images, signing content