Top 4 Go security-hardening Projects
-
vuls
Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
-
InfluxDB
InfluxDB – Built for High-Performance Time Series Workloads. InfluxDB 3 OSS is now GA. Transform, enrich, and act on time series data directly in the database. Automate critical tasks and eliminate the need to move data externally. Download now.
-
What HTTPS/TLS related bits are you talking about? The code looks like it supports your use case. It has a "BehindProxy" setting:
https://github.com/google/go-safeweb/blob/c2d1215a6a2445915c...
-
> Conda-forge/sqlite-feedstock; recipe/meta.yml,
Aside from the cross-compilation, which is most definitely part of the process but has not yet been explored, nothing in your build immediately sticks out at as problematic, but i've bookmarked it for future reference during the port.
> Is there a [multi-stage] Dockerfile to build, install and test SQLite with the new build system?
Not that the sqlite project maintains, no. None of us use docker in any capacity. We work only from the canonical source tree and we like to think that it's easy enough to do that other folks can too.
> Is there SLSA signing for the SQLite build artifacts?
That's out of scope for, and unrelated to, this particular sub-project.
> slsa-framework/slsa-github-generator: https://github.com/slsa-framework/slsa-github-generator
says:
> This repository contains free tools to generate and verify SLSA Build Level 3 provenance for native GitHub projects using GitHub Actions.
We don't use github except to post a read-only mirror of the canonical source tree.
-
Go security-hardening discussion
Go security-hardening related posts
Index
What are some of the best open-source security-hardening projects in Go? This list will help you:
# | Project | Stars |
---|---|---|
1 | vuls | 11,661 |
2 | go-safeweb | 1,486 |
3 | slsa-github-generator | 485 |
4 | appvm | 265 |