sig-security
ESPKey
Our great sponsors
sig-security | ESPKey | |
---|---|---|
21 | 1 | |
1,944 | 286 | |
2.1% | 2.8% | |
9.7 | 0.0 | |
3 days ago | 12 months ago | |
HTML | HTML | |
GNU General Public License v3.0 or later | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
sig-security
-
Introduction to the Kubernetes ecosystem
It is also interesting to meet the community : the TAGs (Tech Advisor Group) which provide strategic guidance and advice on technical issues, as well as the SIGs (Special Interest Group) which focuses on areas of interest or specific expertise within the Kubernetes community to drive development and innovation. The TAGs are specialized by areas, for example on security or environmental sustainability.
- Practicing Threat Modeling to Assess and Fortify Open Source Security [pdf]
-
Cloud Native Applications - Part 2: Security
Cloud Native Security Whitepaper
-
Does Kubernetes support SELinux?
As Daniel Walsh himself wrote in a blog post, CRI-O integrates very well with SELinux and prevents dangerous actions like a container loading an old, unmaintained and therefore potentially vulnerable kernel module and breaking out of the isolation. Additionally, the Kubernetes API itself contains resources to specifically configure SELinux labels for containers. Doesn't sound like something they would do for a tool that "doesn't work with Kubernetes", according to some. Also, the CNCF security whitepaper mentions SELinux as a tool that can be used to provide isolation and limit privileges, which is as much as we could expect from an high-level, architecturally-minded document.
- Cloud Native Security Whitepaper v2
- Cloud Native Security Whitepaper [pdf]
- Catalog of Supply Chain Compromises
- tag-security/supply-chain-security/compromises at main · cncf/tag-security
- supply-chain-security - Catalog of Supply Chain Compromises
ESPKey
-
Why the hate for LPL?
There are lots of commercially available Wiegand sniffers. The ESPKey is pretty popular.
What are some alternatives?
cool-system - The Cloud Optimized Operational Lab (COOL) system
esp-rfid - ESP8266 RFID (RC522, PN532, Wiegand, RDM6300) Access Control system featuring WebSocket, JSON, NTP Client, Javascript, SPIFFS
mkosi - 💽 Build Bespoke OS Images
trigger - Android app to lock/unlock/ring doors. Supports generic HTTPS/SSH/Bluetooth/MQTT and Nuki Smartlock.
slsa - Supply-chain Levels for Software Artifacts
THC-Archive - All releases of the security research group (a.k.a. hackers) The Hacker's Choice
spack - A flexible package manager that supports multiple versions, configurations, platforms, and compilers.
oso - Oso is a batteries-included framework for building authorization in your application.
badPods - A collection of manifests that will create pods with elevated privileges.
Hasura - Blazing fast, instant realtime GraphQL APIs on your DB with fine grained access control, also trigger webhooks on database events.
cyclonedx-gomod - Creates CycloneDX Software Bill of Materials (SBOM) from Go modules
reconftw - reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities