Up your coding game and discover issues early. SonarLint is a free plugin that helps you find & fix bugs and security issues from the moment you start writing code. Install from your favorite IDE marketplace today. Learn more →
Sig-security Alternatives
Similar projects and alternatives to sig-security
-
spack
A flexible package manager that supports multiple versions, configurations, platforms, and compilers.
-
-
SonarLint
Clean code begins in your IDE with SonarLint. Up your coding game and discover issues early. SonarLint is a free plugin that helps you find & fix bugs and security issues from the moment you start writing code. Install from your favorite IDE marketplace today.
-
-
-
badPods
A collection of manifests that will create pods with elevated privileges.
-
-
cyclonedx-gomod
Creates CycloneDX Software Bill of Materials (SBOM) from Go modules
-
InfluxDB
Build time-series-based applications quickly and at scale.. InfluxDB is the Time Series Platform where developers build real-time applications for analytics, IoT and cloud-native services. Easy to start, it is available in the cloud or on-premises.
-
Ansible
Ansible is a radically simple IT automation platform that makes your applications and systems easier to deploy and maintain. Automate everything from code deployment to network configuration to cloud management, in a language that approaches plain English, using SSH, with no agents to install on remote systems. https://docs.ansible.com.
-
ua-parser-js
UAParser.js - Detect Browser, Engine, OS, CPU, and Device type/model from User-Agent data. Supports browser & node.js environment.
-
OPA (Open Policy Agent)
An open source, general-purpose policy engine.
sig-security reviews and mentions
-
Cloud Native Applications - Part 2: Security
Cloud Native Security Whitepaper
-
Secure software supply chain: why every link matters
Fortunately, not every attack has a big enough impact to appear in the newspaper, but let’s analyze some of the most relevant and recent ones. Many other examples of different types of supply chain attacks are also collected by the CNCF in their Catalog of Supply Chain Compromises.
-
Transparency and user agency as principles for distributing and consuming open source software packages
Hooks, triggers and other artifacts are regularly abused to achieve certain automation goals such as preseeding configuration or performing certain provisioning steps right after install, sometimes overreaching in terms of administrative privileges usage with broad security implications.
-
A note from our sponsor - SonarLint
www.sonarlint.org | 29 Jan 2023
Stats
cncf/sig-security is an open source project licensed under GNU General Public License v3.0 or later which is an OSI approved license.