Go security-hardening

Open-source Go projects categorized as security-hardening

Top 4 Go security-hardening Projects

security-hardening
  1. vuls

    Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices

  2. InfluxDB

    InfluxDB – Built for High-Performance Time Series Workloads. InfluxDB 3 OSS is now GA. Transform, enrich, and act on time series data directly in the database. Automate critical tasks and eliminate the need to move data externally. Download now.

    InfluxDB logo
  3. go-safeweb

    Secure-by-default HTTP servers in Go.

    Project mention: Go-Safeweb | news.ycombinator.com | 2024-11-13

    What HTTPS/TLS related bits are you talking about? The code looks like it supports your use case. It has a "BehindProxy" setting:

    https://github.com/google/go-safeweb/blob/c2d1215a6a2445915c...

  4. slsa-github-generator

    Language-agnostic SLSA provenance generation for Github Actions

    Project mention: SQLite is porting away from the GNU Autotools | news.ycombinator.com | 2024-10-22

    > Conda-forge/sqlite-feedstock; recipe/meta.yml,

    Aside from the cross-compilation, which is most definitely part of the process but has not yet been explored, nothing in your build immediately sticks out at as problematic, but i've bookmarked it for future reference during the port.

    > Is there a [multi-stage] Dockerfile to build, install and test SQLite with the new build system?

    Not that the sqlite project maintains, no. None of us use docker in any capacity. We work only from the canonical source tree and we like to think that it's easy enough to do that other folks can too.

    > Is there SLSA signing for the SQLite build artifacts?

    That's out of scope for, and unrelated to, this particular sub-project.

    > slsa-framework/slsa-github-generator: https://github.com/slsa-framework/slsa-github-generator

    says:

    > This repository contains free tools to generate and verify SLSA Build Level 3 provenance for native GitHub projects using GitHub Actions.

    We don't use github except to post a read-only mirror of the canonical source tree.

  5. appvm

    Nix-based app VMs

NOTE: The open source projects on this list are ordered by number of github stars. The number of mentions indicates repo mentiontions in the last 12 Months or since we started tracking (Dec 2020).

Go security-hardening discussion

Log in or Post with

Go security-hardening related posts

  • SLSA up to v1.9.0 (latest) breaking GHA pipelines

    1 project | news.ycombinator.com | 20 Mar 2024
  • Degree vs Certifications

    1 project | /r/sysadmin | 23 Mar 2023
  • Combining NixOS with Qubes/Tails

    1 project | /r/NixOS | 24 Oct 2022
  • Virtualize Your Network on FreeBSD with VNET

    2 projects | news.ycombinator.com | 30 Dec 2020

Index

What are some of the best open-source security-hardening projects in Go? This list will help you:

# Project Stars
1 vuls 11,661
2 go-safeweb 1,486
3 slsa-github-generator 485
4 appvm 265

Sponsored
InfluxDB – Built for High-Performance Time Series Workloads
InfluxDB 3 OSS is now GA. Transform, enrich, and act on time series data directly in the database. Automate critical tasks and eliminate the need to move data externally. Download now.
www.influxdata.com