portauthority
API that leverages Clair to scan Docker Registries and Kubernetes Clusters for vulnerabilities (by target)
clair
Vulnerability Static Analysis for Containers [Moved to: https://github.com/quay/clair] (by coreos)
portauthority | clair | |
---|---|---|
1 | 1 | |
151 | 8,798 | |
0.0% | - | |
0.0 | 9.2 | |
about 1 year ago | almost 2 years ago | |
Go | Go | |
GNU General Public License v3.0 or later | Apache License 2.0 |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
portauthority
Posts with mentions or reviews of portauthority.
We have used some of these posts to build our list of alternatives
and similar projects.
-
Whitelisting docker images, is it practically feasible?
I'm not sure if that kind of thing is still around, but I know Prisma Cloud is a thing and Target's PortAuthority repo did basically what we did: https://github.com/target/portauthority.
clair
Posts with mentions or reviews of clair.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2022-06-16.
-
Harbor + Kubernetes = Self-Hosted Container Registry
Besides making it possible to host your Docker registry yourself, Harbor also comes with a variety of other nice features, many of them related to improving security. With your images hosted in Harbor, you can set up vulnerability scanning to make sure that you are aware of all the vulnerabilities present in your images. This is accomplished via open-source projects Trivy and Clair. You can use the severity levels to decide what images are allowed to be used, for example, restricting any images containing severe vulnerabilities. On top of that, Harbor also provides support for general supply chain security, signing images, and much more.
What are some alternatives?
When comparing portauthority and clair you can also consider the following projects:
pouch - An Efficient Enterprise-class Container Engine
p2plab - performance benchmark infrastructure for IPLD DAGs
umoci - umoci modifies Open Container images
kube-image-keeper - kuik is a container image caching system for Kubernetes
squ - One step to speed up testing cycle based on code diff. For multiple languages.
Harbor - An open source trusted cloud native registry project that stores, signs, and scans content.
trivy - Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
clair - Vulnerability Static Analysis for Containers
helm - The Kubernetes Package Manager
images - Public Chainguard Images
kubernetes - Production-Grade Container Scheduling and Management