A compilation of resources in the software supply chain security domain, with emphasis on open source.
- awesome-software-supply-chain-security
There is no prescribed taxonomy for this domain. This list will necessarily have some overlap with disciplines and categories such as DevSecOps, SAST, SCA and more.
The supply-chain-synthesis repo offers a long-form read on why that's the case, plus helpful pointers to understand and navigate it as it evolves.
For awesome-software-supply-chain-security we take the following high-level approach: different actors in the supply chain contribute attestations to the elements represented in the chain.
In this process-centric view, attestations are emitted, augmented (e.g., during composition) and verified.
Another way to look at this was described here by Josh Bressers, and here's a narrative example in the wild from Spotify
Using this lens we can identify a large group of "subjects" (dependencies), distinct categories of "facts" (licenses or vulnerabilities) and the specific role of identity, provenance and build systems. This is the rationale behind the current headings, which are expected to evolve with the domain.
Other examples of the ongoing process to define the domain include Add Bad Design as a supply chain scenario · Issue #249 · slsa-framework/slsa and How does SLSA fit into broader supply chain security? · Issue #276 · slsa-framework/slsa. Check out this tweet from Aeva Black with Dan Lorenc for another in-a-pinch view of a couple key projects.
This section includes: package management, library management, dependency management, vendored dependency management, by-hash searches, package, library and dependency naming, library behavior labeling, library publishing, registries and repositories, publishing gates and scans, dependency lifecycle.
-
picatz/deputy: Comprehensive dependency management tool for secure dependency lifecycle management covering vulnerability scans, diffs, fixes, SBOMs, sandboxed execution, and policy-as-code enforcement across repos, images, and registries. Read: Introduction to Deputy
-
Read: HyperRes: A Formal System for Cross-Ecosystem Dependency Resolution, addressing multi-lingual projects by enabling versioned dependency resolution across language ecosystems without requiring users to shift package managers
-
guacsec/guac: GUAC aggregates software security metadata into a high fidelity graph database.
-
Online services that help understand what a specific dependency is, or at least whether it's known (usually feeding it a package identifier, such as
purl, CPE or another form ofecosystem:name:version, or alternatively via hash):- NSRL: hashes for COTS software, well-integrated in tooling from sleuthkit/hfind to nsrllookup
- A source that can be queried via a public API (HTTP and DNS!) and can be more open source-aware is CIRCL hashlookup
- Repology has legendary coverage for Linux packages across multiple distribution; its repology-updater and other infrastructure pieces are open source. It provides an updater for WikiData which also has properties of interest for the supply chain security domain.
- Debian's external repositories metadata
- Tidelift's libraries.io provides an API and supports over 30 package ecosystems (and several useful open source tools)
- WhiteSource's Unified Agent also offers some sophisticated file matching abilities
- The Software Heritage Project has massive ingestion capabilities and offers an API which can efficiently check whether a hash is known, and provide certain information on the file if so
- Also see swh scanner CLI
- hashdd - Known Good Cryptographic Hashes
- ClearlyDefined provides licensing information for open source components, given their coordinates
- LGTM - Code Analysis Platform to Find and Prevent Vulnerabilities allows manually searching by GitHub repo
- Binary Transparency directory offers an API that allows to search packages by hash and other attributes
- A somehow related read is the second half of How Cloudflare verifies the code WhatsApp Web serves to users
- And Subresource Integrity
- Not to be confused with the legendary read on Binary Transparency
-
For inputs acquired e.g., via
curl:- SpectralOps/preflight: preflight helps you verify scripts and executables to mitigate chain of supply attacks such as the recent Codecov hack.
- apiaryio/curl-trace-parser: Parser for output from Curl --trace option
- Friends don't let friends Curl | Bash
- Falco
- aquasecurity/tracee: Linux Runtime Security and Forensics using eBPF
- genuinetools/bane: Custom & better AppArmor profile generator for Docker containers.
- containers/oci-seccomp-bpf-hook: OCI hook to trace syscalls and generate a seccomp profile
- bottlerocket-os/hotdog: Hotdog is a set of OCI hooks used to inject the Log4j Hot Patch into containers.
-
6mile/super-confused: Dependency confusion analysis tool supporting 17+ file formats and SBOM files, identifying confusion opportunities across npm, PyPI, Cargo, Packagist, RubyGems, Maven, Go and other ecosystems
-
mchmarny/reputer: CLI tool that calculates contributor reputation scores from Git provider APIs (GitHub, GitLab) as an identity confidence indicator based on cryptographic signing, 2FA enablement, account age, and engagement depth. Read: Scoring Contributor Reputation
-
DataDog/supply-chain-firewall: Python tool for preventing installation of malicious and vulnerable PyPI and npm packages, protecting developers' workstations from supply chain attacks. Read: Introducing Supply-Chain Firewall
-
ossf/package-analysis: Open Source Package Analysis and ossf/package-feeds: Feed parsing for language package manager updates
- Related: Introducing Package Analysis: Scanning open source packages for malicious behavior
- Also Argo Security Automation with OSS-Fuzz, Improving Security by Fuzzing the CNCF landscape and google/oss-fuzz: OSS-Fuzz - continuous fuzzing for open source software.
- And ClusterFuzzLite
- For Node.js: CodeIntelligenceTesting/jazzer.js: Coverage-guided, in-process fuzzing for the Node.js
- Also, although arguably more in the realm of application observability, IntelLabs/control-flag: A system to flag anomalous source code expressions by learning typical expressions from training data
-
cugu/gocap: List your dependencies capabilities and monitor if updates require more capabilities.
-
MATE: Interactive Program Analysis with Code Property Graphs and see GaloisInc/MATE: MATE is a suite of tools for interactive program analysis with a focus on hunting for bugs in C and C++ code using Code Property Graphs and docs
-
Open Source Security Foundation (OpenSSF) Alpha-Omega Project
-
Socket - Find and compare millions of open source packages, focused on JavaScript
-
Shai Hulud 2.0 Scanner - Fast, comprehensive scanner to detect the Shai Hulud 2.0 npm supply chain attack (796+ compromised packages). Scans for malicious files, credential theft patterns, and compromised package ecosystems.
-
diffoscope: in-depth comparison of files, archives, and directories
-
OSS Insight, powered by TIDB Cloud, is an insight tool that can help you analyze in depth any single GitHub repository/developers, compare any two repositories using the same metrics, and provide comprehensive, valuable, and trending open source insights.
-
From Projects | Software Transparency Foundation, see OSSKB | Free Open Source Inventorying
- And particularly: scanoss.py/PACKAGE.md at main · scanoss/scanoss.py
-
Artifact Hub, featuring Packages security report and also verifies with cosign
-
ocicl/ocicl: ASDF system package manager for Common Lisp - all packages managed by ocicl have their signatures stored in the Rekor transparency log
-
SpecterOps/DeepPass2: Multi-layer secrets detection using regex patterns, fine-tuned BERT, and LLM verification to identify both structured tokens and context-dependent free-form passwords in documents
-
mongodb/kingfisher: High-performance secret scanner that detects and validates secrets by testing against external systems, reducing false positives through entropy analysis and real-time verification across AWS, Azure, GCP, and other platforms
-
Sourcegraph from Sourcegraph
-
Onboard open-source contributors on Open Source Hub, see the docker-slim example in Codesee
-
Code Checker from Snyk
-
cve-search/git-vuln-finder: Finding potential software vulnerabilities from git commit messages
-
trailofbits/vendetect: Command-line tool for automatically detecting vendored and copy/pasted code between repositories using similarity detection algorithms to identify code reuse and potential intellectual property issues
-
TaptuIT/awesome-devsecops: Curating the best DevSecOps resources and tooling.
-
Several interesting concepts in: Shopify/seer-prototype: Security Expert Elicitation of Risks
This section includes: package/library scanners and detectors, SBOM formats, standards, authoring and validation, and a few applications. Will likely include SCA.
The most complete reference is awesomeSBOM/awesome-sbom. Another helpful repo focusing on generators is cybeats/sbomgen: List of SBOM Generation Tools.
-
AppSec Santa — SCA Tools - Curated comparison of SCA tools with features, pricing, and alternatives.
-
- Also: git-bom/bomsh: bomsh is collection of tools to explore the GitBOM idea
- yonhan3/gitbom-repo: A repository of gitBOM docs for Linux binaries
- Listen: GitBOM. It’s not Git or SBOM and GitBOM: Repurposing Git’s Graph for Supply Chain Security & Transparency
- Also see bomsage/vision.md at main · dpp/bomsage, and pkgconf/main.c at master · pkgconf/pkgconf (more info in this thread)
-
OWASP's SCA tools list is comprehensive on its own
-
Mend SCA SBOM, Mend Bolt: Find and Fix Open Source vulnerabilities and Whitesource Renovate: Automated Dependency Updates
-
JFrog Xray - Universal Component Analysis & Container Security Scanning
-
guacsec/trustify provides a searchable abstraction over CycloneDX/SPDX SBOMs, cross-referencing against security advisories to identify vulnerabilities. See docs
-
trustification/trustification: A collection of services for storing and managing SBOMs and VEX documents (Bombastic, Vexination, V11y, Collectorist, Spog) with vulnerability lookup, impact analysis, search, and sharing capabilities via Helm chart or single binary
-
eclipse-sw360/sw360 is an open source software component catalogue for managing software components, licenses, and compliance with SPDX support. See eclipse.dev/sw360/
-
oss-review-toolkit/ort: A suite of tools to assist with reviewing Open Source Software dependencies.
-
fosslight/fosslight: FOSSLight is an integrated open source management system that supports the open source software lifecycle, including dependency analysis, license compliance, and SBOM generation. See fosslight.org
-
fsfe/reuse-tool: REUSE is a tool to check and annotate source files with SPDX license identifiers, making license and copyright information machine-readable. See reuse.software
-
anchore/syft: CLI tool and library for generating a Software Bill of Materials from container images and filesystems from Software supply chain security solutions • Anchore
-
ANNOUNCE: Scan is now in maintenance mode · Issue #352 · ShiftLeftSecurity/sast-scan
-
Aqua Cloud Native Security, Container Security & Serverless Security
-
REA-Products/C-SCRM-Use-Case at master · rjb4standards/REA-Products from this tweet
- Also see Energy SBOM Proof of Concept - INL
-
Phylum Analyze PR Action: GitHub Action to analyze Pull Requests for open-source supply chain issues from Phylum | The Software Supply Chain Security Company
-
microsoft/component-detection: Scans your project to determine what components you use
-
Software Identification (SWID) Tagging | CSRC and Guidelines for the Creation of Interoperable Software Identification (SWID) Tags
-
hughsie/python-uswid: A tiny tool for embedding CoSWID tags in EFI binaries
- Also see thread
- And practical example in coreboot
- Also see thread
-
ckotzbauer/sbom-operator: Catalogue all images of a Kubernetes cluster to multiple targets with Syft
-
Security problem management in Dynatrace Application Security
-
DefectDojo/django-DefectDojo: DefectDojo is a DevSecOps and vulnerability management tool.
- Impressive list of integrations with samples: DefectDojo/sample-scan-files: Sample scan files for testing DefectDojo imports
-
swingletree-oss/swingletree: Integrate and observe the results of your CI/CD pipeline tools
-
BBVA/susto: Systematic Universal Security Testing Orchestration
-
AppThreat/rosa: An experiment that looks very promising so far.
-
FOSSA's SBOM Solution
-
opensbom-generator/spdx-sbom-generator: Support CI generation of SBOMs via golang tooling.
-
Tauruseer's SBOM tools
-
Fortress: Software Bill of Materials
-
Cybeats SBOM Studio
-
DeepBOM from Deepbits, an AI-powered platform for SBOM management, vulnerability assessment, malware detection and license compliance
-
edgebitio/edgebit-build: GitHub action to upload SBOMs to EdgeBit and receive vulnerability context in your pull requests from EdgeBit - Real-time supply chain security, enabling security teams to target and coordinate vulnerability remediation without toil.
-
Veracode's SCA to Automate Security Scanning, see demo: How to generate a Software Bill of Materials (SBOM) using Veracode Software Composition Analysis
-
Enterprise Edition - BluBracket: Code Security & Secret Detection
-
Sonatype OSS Index is a free service that catalogs open source components and identifies known vulnerabilities, available via web and REST API. Integrations include:
- sonatype/ossindex-maven: Sonatype OSS Index - Maven Integrations (Maven plugin and enforcer rules)
- sonatype-nexus-community/scan-gradle-plugin: A Gradle plugin for scanning dependencies with OSS Index and Nexus Lifecycle
- sonatype-nexus-community/auditjs: Audit JavaScript projects using Sonatype OSS Index or Nexus Lifecycle
- sonatype-nexus-community/nancy: Checks for vulnerabilities in your Golang dependencies using OSS Index
- sonatype-nexus-community/jake: Check your Python environments and dependencies for known vulnerabilities using OSS Index
- illikainen/ossaudit: Audit Python packages for known vulnerabilities using OSS Index
- sonatype-nexus-community/chelsea: Interact with Sonatype OSS Index to check for vulnerabilities in your Ruby Gems
- sonatype-nexus-community/bach: Interact with Sonatype OSS Index to check for vulnerabilities in your PHP (Composer) dependencies
- sonatype-nexus-community/cargo-pants: Check for vulnerabilities in your Rust Cargo dependencies using OSS Index
- sonatype-nexus-community/oysteR: Secure your R dependencies against known vulnerabilities using OSS Index
- sonatype-nexus-community/ahab: Scan for vulnerabilities in your apt or yum managed dependencies using OSS Index
- sonatype-nexus-community/cheque: Checks for vulnerabilities in your C/C++ dependencies using OSS Index
- sonatype-nexus-community/DevAudit: Open-source, cross-platform, multi-purpose security auditing tool targeting developers and DevSecOps teams
-
tap8stry/orion: Go beyond package manager discovery for SBOM
-
SoftwareDesignLab/SBOM-in-a-Box, a unified platform for SBOM generation (using integrated open source tools), conversion (SPDX/CycloneDX), VEX generation, quality metrics, comparison and merging
-
philips-software/SPDXMerge: Tool for merging multiple SPDX JSON/Tag-value SBOMs into a parent SBOM, supporting deep merge (consolidate contents) and shallow merge (create references) with GitHub Action and Docker support
-
interlynk-io/sbomqs: SBOM quality score - Quality metrics for your sboms
-
eBay/sbom-scorecard: Generate a score for your sbom to understand if it will actually be useful.
-
Sbomify: SBOM platform with attestation verification support using Sigstore and GitHub attestations, SPDX 2.3 export, product lifecycle management, and compliance tracking. Read: Announcing Sbomify v0.25: Attestations
-
Read: An Empirical Study of the SBOM Landscape, a deep-dive into 6 SBOM tools and the accuracy of the SBOMs they produce for complex open-source Java projects (IEEE Security & Privacy, 2023)
- Also see: How to Quickly Measure SBOM Accuracy for Free from Endor Labs, with a reproducible script at endorlabs/sbom-lab
- Read: Software Bill of Materials (SBOM) Harmonization Plugfest 2024 by CMU's SEI, analyzing causes of SBOM divergence across 243 sample SBOMs from 21 tool vendors and recommending harmonization approaches
-
Read: OWASP CycloneDX — Authoritative Guide to SBOM, a comprehensive PDF guide on Software Bill of Materials, formats, and best practices
-
SBOM Insights blog covering SBOM compliance frameworks (NTIA minimum elements, BSI standards), quality scoring with sbomqs, and practical SBOM use cases
-
cyfinoid/aibommaker: AI BOM Generator, a client-side web tool for analyzing GitHub repositories for AI/LLM usage and generating AI Bills of Materials in CycloneDX 1.7 and SPDX 3.0.1 formats with hardware, infrastructure, and governance detection
-
trustification/AIBOM-generator: Generate AI Bills of Materials for Hugging Face models, documenting AI model dependencies and provenance
-
Trusera/ai-bom: AI Bill of Materials generator for agent workflows, scanning n8n, LangGraph, and CrewAI workflows for AI components and generating SBOM output in CycloneDX and SPDX formats
More interesting resources:
- Brakeing Down Security Podcast: 2020-031-Allan Friedman, SBOM, software transparency, and knowing how the sausage is made
- Episode 312: The Legend of the SBOM
- Reimagining Cyber Podcast: Log4j vulnerability provides harsh lessons in unknown dependencies
- Tech Debt Burndown Podcast Series 1 E11: Allan Friedman and SBOMs
- Sounil Yu on SBOMs, software supply chain security - Security Conversations
- Exploring Security. Criticality of SBOM. Scott McGregor, Cloud Security, Wind River
- Down the Security Rabbithole Podcast: DtSR Episode 487 - Software Supply Chain is a BFD
- Software Composition Analysis Podcast: Software Supply Chain - Episode 1
- Critical Update: Do You Know What’s In Your Software?
- Software Bill of Materials | CISA
- SBOM Use Case - RKVST and RKVST SBOM Hub - RKVST
- Also read: SBOM Hub - NTIA Attribute Mappings
- BOF: SBOMs for Embedded Systems: What's Working, What's Not? - Kate Stewart, Linux Foundation
- All About That BoM, ‘bout That BoM - Melba Lopez, IBM
- OWASP CycloneDX Launches SBOM Exchange API
- Read: SBOM Management | Six Ways It Prevents SBOM Sprawl
- Read: NTIA's The Minimum Elements For a Software Bill of Materials
- Read: What an SBOM Can Do for You
A few open source projects are documenting, in public, how they acquire dependencies. This intentional, human-parsable, long-form examples can be illustrative:
- envoy/DEPENDENCY_POLICY.md at main · envoyproxy/envoy
- What curl expects from dependencies
- Security: The Value of SBOMs from Flux
- OSV
- Read: SBOM in Action: finding vulnerabilities with a Software Bill of Materials
- Read: Announcing OSV-Scanner V2: Vulnerability scanner and remediation tool for open source
- Related: spdx/spdx-to-osv: Produce an Open Source Vulnerability JSON file based on information in an SPDX document
- Tools: google/osv-scanner: Vulnerability scanner written in Go which uses the data provided by https://osv.dev
- Qualys' Vulnerability Detection Pipeline
- Vuls · Agentless Vulnerability Scanner for Linux/FreeBSD
- Vulnerability Database, an API is also available; see VulDB
- AppThreat/vulnerability-db: Vulnerability database and package search for sources such as OSV, NVD, GitHub and npm.
- vulnerability-lookup/vulnerability-lookup: Vulnerability correlation platform with multi-source feeds (NVD, GitHub, OSV, national databases), CVD management, sightings tracking, comments, bundles, and API for rapid lookup and cross-source correlation
- aquasecurity/trivy: Scanner for vulnerabilities in container images, file systems, and Git repositories, as well as for configuration issues
- SAST for Code Security | Snyk Code
- Also see: Choosing Open Source Libraries from Snyk
- Contrast Community Edition
- Known Exploited Vulnerabilities Catalog | CISA
- TURROKS/CVE_Prioritizer: Prioritize vulnerability patching by combining CVSS, EPSS, CISA KEV, and VulnCheck data
- cve-search/cve-search: cve-search - a tool to perform local searches for known vulnerabilities
- Exein-io/kepler: NIST-based CVE lookup store and API powered by Rust
- nexB/vulnerablecode: A work-in-progress towards a free and open vulnerabilities database and the packages they impact. And the tools to aggregate and correlate these vulnerabilities. Sponsored by NLnet https://nlnet.nl/project/vulnerabilitydatabase/ for https://www.aboutcode.org/ Chat at https://gitter.im/aboutcode-org/vulnerablecode
- toolswatch/vFeed: The Correlated CVE Vulnerability And Threat Intelligence Database API
- ossf/scorecard: Security Scorecards - Security health metrics for Open Source, OpenSSF Metrics and ossf/security-reviews: A community collection of security reviews of open source software components.
- ossf/scorecard-action: Official GitHub Action for OSSF Scorecards.
- Also OpenSSF Security Insights Spec
- Read: How OpenSSF Scorecards can help to evaluate open-source software risks
- Great real life example: State of the Eclipse Foundation GitHub repositories
- Also see: naveensrinivasan/scorecard-1000-critical-projects, using the Scorecard API to analyze the top 1000 critical open source projects from the Criticality Score dataset
- Lynis - Security auditing and hardening tool for Linux/Unix
- victims/victims-cve-db: CVE database store
- anchore/grype: A vulnerability scanner for container images and filesystems
- GitHub Advisory Database now open to community contributions
- Global Security Database Working Group | CSA, also see cloudsecurityalliance/gsd-database: Global Security Database
- trickest/cve: Gather and update all available and newest CVEs with their PoC.
- RFC 9116: A File Format to Aid in Security Vulnerability Disclosure
- An AOSP vuln-to-commit exercise: quarkslab/aosp_dataset: Large Commit Precise Vulnerability Dataset based on AOSP CVE
- nyph-infosec/daggerboard
- davideshay/vulnscan: Vulnerability Scanner Suite based on grype and syft from anchore
- devops-kung-fu/bomber: Scans SBoMs for security vulnerabilities
- Fortress: Vulnerability Management
- Vulnerability Management | aDolus
- secvisogram/secvisogram: Secvisogram is a web tool for creating and editing security advisories in the CSAF 2.0 format
- future-architect/vuls: Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
- infobyte/faraday: Open Source Vulnerability Management Platform from Faraday - Community v4 Release
- mitre/saf: The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools developed by MITRE and the security community to streamline security automation for systems and DevOps pipelines
- devops-kung-fu/bomber: Scans Software Bill of Materials (SBOMs) for security vulnerabilities
- Rezilion/mi-x: Determine whether your compute is truly vulnerable to a specific vulnerability by accounting for all factors which affect actual exploitability (runtime execution, configuration, permissions, existence of a mitigation, OS, etc..)
- ossf-cve-benchmark/ossf-cve-benchmark: The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebases using a variety of static analysis security testing (SAST) tools and generate reports to evaluate those tools.
- See the Vulnerability Management in the NeuVector Docs for integration examples in container scenarios
- noqcks/xeol: An end-of-life (EOL) package scanner for container images, systems, and SBOMs
- mchmarny/vimp: Compare data from multiple vulnerability scanners to get a more complete picture of potential exposures.
A dedicated section on VEX reads:
- CycloneDX - Vulnerability Exploitability Exchange (VEX)
- Vulnerability eXploitability Exchange explained: How VEX makes SBOMs actionable
- How VEX helps SBOM+SLSA improve supply chain visibility | Google Cloud Blog
- What is VEX and What Does it Have to Do with SBOMs?
- What is VEX? It's the Vulnerability Exploitability eXchange!
- The Vulnerability Exploitability eXchange (VEX) standard
- Vex and SBOMs
- VDR or VEX – Which Do I Use? Part 1
- VEX! or... How to Reduce CVE Noise With One Simple Trick! by Frederick Kautz
- Vulnerability Exploitability eXchange (VEX) - Status Justifications
- Real-time VEX
Also see:
- Vulncode-DB on deprecation path
- GitHub brings supply chain security features to the Rust community
- CyCognito Adopts Mapping ATT&CK to CVE for Impact
- Read: A closer look at CVSS scores, Patch Madness: Vendor Bug Advisories Are Broken, So Broken and An Incomplete Look at Vulnerability Databases & Scoring Methodologies
- Read: How to Analyze an SBOM and How to Generate and Host SBoMs from Cloudsmith
- Read: After the Advisory from Google's Open Source Insights team
This section includes: admission and ingestion policies, pull-time verification and end-user verifications.
- grafeas/kritis: Solution for securing your software supply chain for Kubernetes apps, enforcing deploy-time security policies
- aquasecurity/trivy-operator: Kubernetes-native security toolkit that continuously scans the cluster for vulnerabilities, misconfiguration, secrets, and exposed sensitive information
- goodwithtech/dockle: Container image linter for security, detects vulnerabilities, helps build best-practice Dockerfiles and supports CIS Benchmarks
- Kyverno
- ckotzbauer/sbom-operator: Catalogue all images of a Kubernetes cluster to multiple targets with Syft
- CONNAISSEUR - Verify Container Image Signatures in Kubernetes
- Kubewarden is a Kubernetes policy engine that uses sigstore to sign and verify its WebAssembly policies, allowing policy authors to leverage sigstore verification capabilities inside their policies to validate OCI artifacts
- sigstore/policy-controller: The policy admission controller used to enforce policy on a cluster on verifiable supply-chain metadata from cosign.
- portieris/POLICIES.md at main · IBM/portieris
- reproducible-containers/repro-get: Reproducible apt/dnf/apk/pacman, with content-addressing
- asfaload/checksums: Repository holding checksums of internet artifacts to improve security of downloads by hosting duplicate verification points
- kpcyrd/pacman-bintrans: Experimental binary transparency for pacman with sigstore and rekor
- Open Policy Agent
- Read: GitHub Artifact Attestations OPA Provider: Enforce admission policies with artifact attestations in Kubernetes - integrating GitHub Artifact Attestations (build provenance, SBOM, custom) with OPA Gatekeeper for Kubernetes admission control
- netskopeoss/beam: Behavioral Evaluation of Application Metrics (BEAM) detects supply chain compromises by analyzing network traffic using machine learning and SHAP explainability to identify malicious behavior patterns
- GitLab Libbehave (Experiment): Scans dependencies during merge request pipelines to identify newly added libraries and their risky behaviors - assigning riskiness scores for behaviors like OS command execution, dynamic code evaluation, and file system access
- Conftest allows to write tests against structured configuration data using the Open Policy Agent Rego query language: here's an example
- Several pre-commit hooks allow vulnerability checking right before dependency ingestion time into the codebase
- e.g., pyupio/safety: Safety checks your installed dependencies for known security vulnerabilities
- Or npm-audit
- Also see snyk-labs/snync: Mitigate security concerns of Dependency Confusion supply chain security risks
- And lirantal/lockfile-lint: Lint an npm or yarn lockfile to analyze and detect security issues
- KTH-LangSec/nodeshield: Runtime enforcement of SBOMs and Capabilities Bill of Materials (CBOM) for Node.js to prevent supply chain attacks
- Or npm-audit
- e.g., pyupio/safety: Safety checks your installed dependencies for known security vulnerabilities
- chains-project/goleash: eBPF-based runtime policy enforcement for Go applications, enforcing least privilege at the package level to detect and block malicious behavior from compromised dependencies
- avilum/secimport: eBPF-based module-level sandboxing for Python applications, enforcing syscall restrictions per Python module to mitigate risks from vulnerable or malicious dependencies
- Or requires.io | Monitor your dependencies
- Or Brakeman Security Scanner
- Or trailofbits/pip-audit: Audits Python environments and dependency trees for known vulnerabilities
- Interesting Python-related project: Project Thoth, using Artificial Intelligence to analyse and recommend software stacks for Python applications
- Or Checkmarx/chainjacking: Find which of your go lang direct GitHub dependencies is susceptible to ChainJacking attack
- Or Cargo Vet and crev-dev/cargo-crev: A cryptographically verifiable code review system for the cargo (Rust) package manager.
- Not automated validation, but comprehensive guidance for Java with a few critical points relating to supply chain security: Google Best Practices for Java Libraries
- Static analysis is often used at this stage in order to detect dependency acquisition, e.g.:
- Semgrep
- graudit/signatures at master · wireghoul/graudit
- banyanops/collector: A framework for Static Analysis of Docker container images
- quay/clair: Vulnerability Static Analysis for Containers
- DataDog/guarddog: GuardDog is a CLI tool to Identify malicious PyPI and npm packages
- eliasgranderubio/dagda: a tool to perform static analysis of known vulnerabilities, trojans, viruses, malware & other malicious threats in docker images/containers and to monitor the docker daemon and running docker containers for detecting anomalous activities
- Half brilliant, half funny, full helpful: kpcyrd/libredefender: Imagine the information security compliance guideline says you need an antivirus but you run Arch Linux
- target/strelka: Real-time, container-based file scanning system for threat hunting, detection, and incident response with file extraction and metadata collection at enterprise scale
- Mandiant capa: Reverse engineering tool that recognizes behaviors in binaries through expert-crafted rules for API calls, constants, and strings; supports static and dynamic analysis via IDA Pro, Binary Ninja, and Ghidra
- KICS - Keeping Infrastructure as Code Secure
- tinkerbell/lint-install: Consistently install reasonable linter rules for open-source projects
hadolintrules on package installation, e.g., hadolint/README.md at d16f342c8e70fcffc7a788d122a1ba602075250d · hadolint/hadolint- Also dockerfile resource scans - checkov from bridgecrewio/checkov: Prevent cloud misconfigurations during build-time for Terraform, CloudFormation, Kubernetes, Serverless framework and other infrastructure-as-code-languages with Checkov by Bridgecrew.
- And: xlab-si/iac-scan-runner: Service that scans your Infrastructure as Code for common vulnerabilities
- And: aws-samples/automated-security-helper1
- And: GeekMasher/quibble, a Rust-based security linter for Docker and Podman Compose files that checks for socket mounting, untrusted registries, hardcoded secrets and more. Read the intro post
- Vulnerability Assessment | OpenSCAP portal
- Detecting Log4Shell with Wazuh
- aquasecurity/starboard: Kubernetes-native security toolkit
- armosec/kubescape: Kubescape is a K8s open-source tool providing a multi-cloud K8s single pane of glass, including risk analysis, security compliance, RBAC visualizer and image vulnerabilities scanning.
- ckotzbauer/vulnerability-operator: Scans SBOMs for vulnerabilities
- chen-keinan/kube-beacon: Open Source runtime scanner for k8s cluster and perform security audit checks based on CIS Kubernetes Benchmark specification
- aquasecurity/kube-bench: Checks whether Kubernetes is deployed according to security best practices as defined in the CIS Kubernetes Benchmark and aquasecurity/kube-hunter: Hunt for security weaknesses in Kubernetes clusters
- openclarity/kubeclarity: KubeClarity is a tool for detection and management of Software Bill Of Materials (SBOM) and vulnerabilities of container images and filesystems
- HarborGuard/HarborGuard: Comprehensive container security scanning platform with intuitive web UI for managing and visualizing security assessments of Docker images
- stackrox/stackrox: The StackRox Kubernetes Security Platform performs a risk analysis of the container environment, delivers visibility and runtime alerts, and provides recommendations to proactively improve security by hardening the environment.
- cloudquery/plugins/source/k8s/policies at main · cloudquery/cloudquery
- quarkslab/kdigger: Kubernetes focused container assessment and context discovery tool for penetration testing
- ossillate-inc/packj: The vetting tool 🚀 behind our large-scale security analysis platform to detect malicious/risky open-source packages and Packj | A vetting tool to avoid "risky" packages
- doowon/sigtool: sigtool for signed PE files in GO
- Introducing "safe npm", a Socket npm Wrapper - Socket
- Introducing SafeDep vet 🚀 | SafeDep
Also see:
- analysis-tools-dev/static-analysis: ⚙️ A curated list of static analysis (SAST) tools for all programming languages, config files, build tools, and more.
- anderseknert/awesome-opa: A curated list of OPA related tools, frameworks and articles
- JupiterOne/secops-automation-examples: Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.
- Securing CICD pipelines with StackRox / RHACS and Sigstore
- Watch: Do you trust your package manager? at Security Fest 2022
And a few things to watch beyond libraries and software dependencies:
- System Transparency | security architecture for bare-metal servers
- sigsum.org: Transparent and verifiable build logs using stronger threat models than centralized transparency logs
- Tillitis: Building open, trustworthy hardware and software for secure computation
- Emulated host profiles in fwupd
- GNOME To Warn Users If Secure Boot Disabled, Preparing Other Firmware Security Help
- Kernel Self Protection Project - Linux Kernel Security Subsystem
- keylime/keylime: A CNCF Project to Bootstrap & Maintain Trust on the Edge / Cloud and IoT
- parallaxsecond/parsec: Platform AbstRaction for SECurity service
- TPM Carte Blanche-resistant Boot Attestation
This section includes: projects and discussions specifics to developer identity, OIDC, keyrings and related topics.
- Part of sigstore
- Cosign
- Fulcio
- Rekor
- Also see: Kubernetes taps Sigstore to thwart open-source software supply chain attacks
- Sigstore-specific view of the OpenSSF Landscape
- Read: Sigstore Bundle Format walks through the structure of Sigstore's offline verification bundle, including signatures, certificates and Rekor inclusion proofs
- sigstore/model-transparency: Signing and verification for ML model integrity and provenance via Sigstore - extends model supply chain security to ML artifacts
- stacklok/toolhive: MCP server deployment platform with Sigstore-based provenance verification and attestation support for container images and binaries
- cas - cas attestation service
- Witness - testifysec/witness: Witness is a pluggable framework for software supply chain risk management. It automates, normalizes, and verifies software artifact provenance.
- puerco/tejolote: A highly configurable build executor and observer designed to generate signed SLSA provenance attestations about build runs.
- in-toto-run - GitHub Marketplace and in-toto/github-action: in-toto provenance github action
- kusaridev/spector is a Rust tool and library for strict generation, validation and verification of supply chain metadata documents, supporting SLSA 1.0 Provenance and in-toto 1.0 Statement. Read the announcement
- General availability of SLSA3 Generic Generator for GitHub Actions
- technosophos/helm-gpg: Chart signing and verification with GnuPG for Helm.
- cashapp/pivit is a command line tool for managing x509 certificates stored on smart cards with PIV applet support that is fully compatible with
git - notaryproject/notary: Notary is a project that allows anyone to have trust over arbitrary collections of data
- notaryproject/roadmap: Roadmap for NotaryV2
- notaryproject/notation: Notation is a project to add signatures as standard items in the registry ecosystem, and to build a set of simple tooling for signing and verifying these signatures. Based on Notary V2 standard.
- notaryproject/tuf: The Update Framework for OCI Registries
- Also see vmware-labs/repository-editor-for-tuf: Command line tool for editing and maintaining a TUF repository
- Also see How to easily try out TUF + in-toto
- Check out Python-TUF reaches version 1.0.0
- Related project: werf/trdl: The universal solution for delivering your software updates securely from a trusted The Update Framework (TUF) repository.
- Read: Secure Software Updates via TUF — Part 2
- goharbor/harbor: Trusted cloud native registry project supporting content signing and verification, RBAC, and vulnerability scanning for OCI artifacts
- deislabs/ratify: Artifact Ratification Framework
- OpenAttestation: Blockchain-based framework for endorsing and verifying documents with cryptographic trust (archived as of October 2025, transitioning to TrustVC). Supports verifiable credentials, selective disclosure, decentralized rendering, and verified issuer identity
- latchset/tang: Tang binding daemon
- ietf-rats - Overview
- An exposed apt signing key and how to improve apt security
- See Issue #21 · testifysec/witness for a succinct description of how testifysec/witness: Witness is a pluggable framework for software supply chain risk management. It automates, normalizes, and verifies software artifact provenance. deals with attestation chains
- Another witness example with GitLab
- Allow using SSH keys to sign commits · Discussion #7744 · github/feedback
- Read: Introducing "Trusted Publishers" on PyPI's use of OpenID Connect for short-lived, tokenless publishing from GitHub Actions, eliminating the need for long-lived API tokens
- aws-solutions/verifiable-controls-evidence-store: This repository contains the source code of the Verifiable Controls Evidence Store solution
- Read: Monitoring the kernel.org Transparency Log for a year
- Read: Using Rekor Monitor (Sigstore blog), covering consistency checking and identity monitoring for Rekor and Fulcio transparency logs
- Read: Guide to Rekor Monitor and Its Integration with Red Hat Trusted Artifact Signer (Red Hat), covering transparency log integrity verification with continuous monitoring and Prometheus metrics
- Read: Catching Malicious Package Releases Using a Transparency Log (Trail of Bits), explaining how rekor-monitor detects compromised signing identities and malicious releases via Rekor transparency logs
- Also read: Software Distribution Transparency and Auditability
- paragonie/libgossamer: Public Key Infrastructure without Certificate Authorities, for WordPress and Packagist
- johnsonshi/image-layer-provenance, a PoC for Image Layer Provenance and Manifest Layer History
- oras-project/artifacts-spec
- recipy/recipy: Effortless method to record provenance in Python
- spiffe/spire: The SPIFFE Runtime Environment
- Fraunhofer-SIT/charra: Proof-of-concept implementation of the "Challenge/Response Remote Attestation" interaction model of the IETF RATS Reference Interaction Models for Remote Attestation Procedures using TPM 2.0.
- google/trillian: A transparent, highly scalable and cryptographically verifiable data store.
- Artifactory - Universal Artifact Management
- pyrsia/pyrsia: Decentralized Package Network
- transmute-industries/verifiable-actions: Workflow tools for Decentralized Identifiers & Verifiable Credentials
- IOTA Notarization is an open-source toolkit for anchoring, updating and verifying data integrity on a decentralized ledger, supporting locked (immutable) and dynamic notarization modes. See iotaledger on GitHub
- Watch: Privacy-preserving Approaches to Transparency Logs
This section includes: reference architectures and authoritative compilations of supply chain attacks and the emerging categories.
- in-toto | A framework to secure the integrity of software supply chains
- VXDF (Validated Exploitable Data Flow): Open security standard for documenting confirmed vulnerabilities with structured evidence of exploitability, using JSON Schema with 33 evidence types and interoperability with SARIF, SPDX, CWE, and CVSS
- Supply chain Levels for Software Artifacts or SLSA (salsa) is a security framework, a check-list of standards and controls to prevent tampering, improve integrity, and secure packages and infrastructure in your projects, businesses or enterprises.
- Great read: SLSA | CloudSecDocs
- Another L50 read: Building trust in our software supply chains with SLSA
- Read: SLSA for Success: Using SLSA to help achieve NIST’s SSDF and All about that Base(line): How Cybersecurity Frameworks are Evolving with Foundational Guidance
- Also, a framework mapping put together by Red Hat
- A Practical Guide to the SLSA Framework by FOSSA
- Read: Securing Gitpod's Software Supply Chain with SLSA
- Read: A First Step to Attaining SLSA Level 3 on GitHub
- SLSA Verification Summary Attestation (VSA) Specification - Technical spec for attestations that verify artifacts at specific SLSA levels with details on dependency verification and policy decisions
- Read: SLSA E2E with AMPEL, a practical end-to-end SLSA implementation walkthrough using AMPEL policy verification and VSA receipts
- And a pattern search across GitHub for inspiration (thanks @infernosec)
- Container Hardening Priorities (CHPs) - Complementary framework for assessing container image security with criteria for minimalism, provenance, configuration, and vulnerabilities. Read: Evaluating Container Security with Container Hardening Priorities
- Open Source Project Security Baseline - OpenSSF's tiered framework of security practices for open source projects, aligned with international cybersecurity standards (CRA, NIST SSDF), providing actionable guidance for developers to enhance security posture
- OWASP Application Security Verification Standard, esp. V14 - Configuration
- OWASP/Software-Component-Verification-Standard: Software Component Verification Standard (SCVS)
- Also see: OWASP SCVS BOM Maturity Model, a formalized taxonomy for evaluating bill of materials capabilities and supporting organizational policies
- CycloneDX/transparency-exchange-api: OWASP Transparency Exchange API (TEA) standard for exchanging SBOM and vulnerability information, standardized in ECMA TC54
- CREST launches OWASP Verification Standard (OVS)
- SAFECODE's Fundamental Practices for Secure Software Development, Third Edition, esp. Manage Security Risk Inherent in the Use of Third-party Components
- SSF | The Secure Software Factory and mlieberman85/supply-chain-examples
- Software Supply Chain Risk Management | BSIMM
- microsoft/scim: Supply Chain Integrity Model
- SecureStackCo/visualizing-software-supply-chain: A visual taxonomy and contextual mapping of software supply chain components organized across 10 stages (People, Local Requirements, Source Code, Integration, Deployment, Runtime, Hardware, DNS, Services, Cloud) with examples of technologies and vendors
- Goodbye SDLC, Hello SSDF! What is the Secure Software Development Framework?
- The Supply Chain Risk Management section of SP 800-53 Rev. 5, Security and Privacy Controls for Info Systems and Organizations | CSRC, also see center-for-threat-informed-defense/attack-control-framework-mappings: Security control framework mappings to MITRE ATT&CK
- SP 800-161 Rev. 1, C-SCRM Practices for Systems and Organizations | CSRC
- npm Best Practices Guide (OpenSSF) - Features and recommendations on using npm safely
- Principles for Package Repository Security (OpenSSF) - Taxonomy and security maturity levels for package repositories across authentication, authorization, general capabilities, and CLI tooling
- CIS Software Supply Chain Security Guide
- microsoft/oss-ssc-framework: Open Source Software Secure Supply Chain Framework
- GitHub's Implementing software security in open source
- Previously referenced: Google Best Practices for Java Libraries
- MITRE's System of Trust
- Securing the Software Supply Chain for Developers was published by the National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA), and the Office of the Director of National Intelligence (ODNI) under the Enduring Security Framework (ESF) initiative
- Read: Government's Role in Increasing Software Supply Chain Security — A Toolbox for Policy Makers from Interface-EU, a three-level policy framework spanning secure development practices, CVD guidance, SBOMs, standards, procurement requirements, and liability regimes
- EU ICT Supply Chain Security Toolbox from the European Commission, providing guidance on identifying, assessing, and mitigating cybersecurity risks in ICT supply chains, aligned with the revised Cybersecurity Act and NIS Cooperation Group recommendations
- OpenSSF's Concise Guide for Developing More Secure Software 2022-09-01
- Chris Hughes on the NSA Recommended Practices for Developers: Securing the Software Supply Chain
- Read: Elements of an Effective Software Supply Chain Strategy proposes 12 elements for software supply chain risk management spanning asset inventory, SBOM, provenance, attestation, compliance and governance
Also see:
- Zero Trust the Hard Way, Kelsey Hightower
- KubePhilly March 2022- A Look At The Kubernetes SLSA Compliance Project
- Supply Chain Risk Management
This section includes: reproducible builds, hermetic builds, bootstrappable builds, special considerations for CI/CD systems, best practices building artifacts such as OCI containers, etc.
- Reproducible Builds, particularly the Documentation
- r-b ecosystem mapping
- Reproducible Builds / reprotest
- Is NixOS Reproducible?
- Read: Is NixOS truly reproducible? - Examines bitwise reproducibility claims and challenges in the Nix ecosystem
- securego/gosec: Go static analysis tool that detects security problems by scanning the Go AST, enforcing secure coding practices
- Bootstrappable Builds (GNU Mes Reference Manual)
- Also read Bootstrappable builds from LWN
- hermetoproject/hermeto: CLI tool that pre-fetches dependencies to enable hermetic builds with explicit, reproducible, and pinned dependencies for network-isolated container builds
- garnix-io/garn: Build tool and development environment manager using declarative TypeScript configuration to encode project dependencies, build steps, and development environment in a single reproducible definition
- tektoncd/chains: Supply Chain Security in Tekton Pipelines
- JReleaser is a release automation tool for Java/JVM projects that can sign artifacts (JARs, Zips, Tars, and other files) with cosign for publishing to AWS S3, JFrog Artifactory, or as release assets on GitHub, GitLab, or Gitea
- google/santa: A binary authorization system for macOS
- fepitre/package-rebuilder: Standalone orchestrator for rebuilding Debian, Fedora and Qubes OS packages in order to generate
in-totometadata which can be used withapt-transport-in-totoordnf-plugin-in-tototo validate reproducible status. - kpcyrd/rebuilderd-debian-buildinfo-crawler: Reproducible Builds: Scraper/Parser for https://buildinfos.debian.net into structured data
- kpcyrd/rebuilderd: Independent verification of binary packages - reproducible builds
- google/oss-rebuild: Automate reproducible building and generate SLSA Provenance for Python, JavaScript/TypeScript, and Rust packages to detect supply chain compromises, with build observability, dynamic analysis, and support for historical package attestation
- tag-security/sscsp.md at main · cncf/tag-security
- defenseunicorns/zarf: DevSecOps for Air Gap & Limited-Connection Systems. https://zarf.dev/
- Lockheed Martin / hoppr / hoppr is a CLI framework for defining, validating, and transferring dependencies between environments
- Example using SBOM as an input: Inputs - Hoppr
- On instrumenting runners:
- Keep an eye on Draft: POC Witness Runner integration (!1) · Merge requests · testifysec / gitlab-runner for GitLab runners
- appsec-jedi/pipeline-sentinel: eBPF-powered security monitor for CI/CD build pipelines detecting and blocking suspicious process executions to prevent supply chain attacks during the build phase
- Also, edgelesssys/constellation: Constellation is the first Confidential Kubernetes. Constellation shields entire Kubernetes clusters from the (cloud) infrastructure using confidential computing.
- aws/uefi: AWS firmware for Nitro instances with reproducible builds to verify measurements against source code, enabling reproducible hardware attestation
- Azure-Samples/microsoft-azure-attestation: Confidential Compute attestation service examples including measurement verification in JWT certificates for tying runtime attestation to build provenance
- Lind-Project/TriSeal (Enarx): WebAssembly-based runtime for executing applications in Trusted Execution Environments (TEEs) such as Intel SGX and AMD SEV-SNP to enable confidential computing for supply chain workloads
- reposaur/reposaur: Open source compliance tool for development platforms.
- buildsec/frsca is an implementation of the CNCF's Secure Software Factory Reference Architecture. It is also intended to follow SLSA requirements closely and generate in-toto attestations for SLSA provenance predicates.
- chainloop-dev/chainloop: Chainloop is an open source software supply chain control plane, a single source of truth for artifacts plus a declarative attestation crafting process.
- Also see: Software Supply Chain Attestation the Easy Way from the Chainloop documentation
- Read: Attestation concepts covers the attestation lifecycle (
init,add,push) and Sigstore bundle format used by Chainloop
- aquasecurity/chain-bench: an open-source tool for auditing your software supply chain stack for security compliance implementing checks for CIS 1.0 | Vulnerability Database | Aqua Security
- globocom/huskyCI: Orchestrates security tests and centralizes results for analysis and metrics across multiple languages (Python, Ruby, JavaScript, Go, Java, HCL), including SAST tools, secrets scanning with GitLeaks, and SCA tools
- ossf/allstar: GitHub App to set and enforce security policies
- kusaridev/skootrs is a CLI tool for creating secure-by-design/default source repos with security best practices built in
- MediaMarktSaturn/technolinator, a GitHub App for pull-request vulnerability analysis and SBOM creation/upload to Dependency-Track, wrapping CDXGen, SBOMQS, and dep-scan/Grype
- scribe-public/gitgat: Evaluate source control (GitHub) security posture
- Legit-Labs/legitify: Detect and remediate misconfigurations and security risks across all your GitHub and GitLab assets
- crashappsec/github-analyzer: A tool to check the security settings of Github Organizations.
- wspr-ncsu/github-actions-security-analysis from Characterizing the Security of Github CI Workflows | USENIX
- oss-reproducible - Measures the reproducibility of a package based on its purported source. Part of OSS Gadget
- jart/landlock-make: Sandboxing for GNU Make has never been easier
- Fraunhofer-AISEC/supply-graph: Graph-based analysis tool for detecting supply chain attacks in build systems by tracing source-to-binary relationships (research/FOSDEM 2025 demonstration project using XZ CVE-2024-3094)
- veraison/veraison: Project Veraison will build software components that can be used to build Attestation Verification Services
- Changelog for Pants 2: The ergonomic build system
- Bazel is an open source build and test tool similar to Make, Maven, and Gradle
- GoogleContainerTools/kaniko: Build Container Images In Kubernetes
- sethvargo/ratchet: A tool for securing CI/CD workflows with version pinning.
- Pinning GitHub Actions guide with statistics on SHA pinning adoption and tools like Frizbee for migration and Renovate for automated updates
- buildsec/vendorme improves the developer workflow by giving you one single place to manage any vendored dependencies, and ensures that those are validated properly to improve the security around your supply chain
- eellak/build-recorder
- rust-secure-code/cargo-auditable: Embed the Cargo dependency tree in your Rust binaries, enabling vulnerability auditing of compiled Rust binaries with zero bookkeeping; supported by cargo-audit, Trivy, Grype, and other tools
- project-copacetic/copacetic: CLI tool for directly patching container images using vulnerability reports from scanners like Trivy, enabling targeted OS package updates without rebuilding images
- apiiro/PRevent: Self-hosted GitHub app that scans pull requests for malicious code patterns including dynamic code execution and obfuscation
- SpecterOps/GitHound: BloodHound OpenGraph collector for GitHub mapping organizational structure, permissions, and roles into navigable attack-path graphs for security audits
Also see:
- The reproducible-builds topic on GitHub
- Dependency management as part of Google Cloud's Artifact Registry documentation
- Security hardening for GitHub Actions
- And: step-security/harden-runner: Security agent for GitHub-hosted runner: block egress traffic & detect code overwrite to prevent breaches
- And: StepSecurity Action Advisor, a tool that scores GitHub Actions for security and suggests maintained alternatives
- Handling build-time dependency vulnerabilities from Create guidance on triaging build time dependency vulnerabilities · Issue #855 · cncf/tag-security
- Code Sight
- cider-security-research/cicd-goat: A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.
- Read: What Makes a Build Reproducible, Part 2
- Read: Building a Secure Software Supply Chain with GNU Guix
- alecmocatta/build_id: Obtain a UUID uniquely representing the build of the current binary.
- Read: On Omitting Commits and Committing Omissions: Preventing Git Metadata Tampering That (Re)introduces Software Vulnerabilities
- Read: Reproducible Builds: Break a log, good things come in trees
- Secure Your Software Factory with melange and apko
- On the
apkopattern, see Shopify/hansel
- On the
- kpcyrd/archlinux-inputs-fsck: Lint repository of PKGBUILDs for cryptographically pinned inputs
- A few resources, in addition to this repository, that can help keep up with news and announcements:
- An RSS feed maintained by @bureado with a mix of open source security, DevSecOps, AppSec and supply chain security news: corner-security
- tl;dr sec Newsletter
- Past Issues | CloudSecList
- News - reproducible-builds.org
- A great compilation of reads, context and learning materials: chainguard-dev/ssc-reading-list: A reading list for software supply-chain security.
- A visual reference by Enso Security: AppSec Map
- A similar one: Jetstack | The Software Supply Chain Toolkit
- wg-security-tooling/guide.md at main · ossf/wg-security-tooling from ossf/wg-security-tooling: OpenSSF Security Tooling Working Group
- A toolbox for a secure software supply chain from Chainguard
- The Technology chapter in Snyk's DevSecOps series
- A helpful list of acronyms: Acronyms | OpenSCAP portal
- slsa/terminology.md at main · slsa-framework/slsa
- tag-security/cloud-native-security-lexicon.md at main · cncf/tag-security
- Watch: How to start learning about Supply Chain Security
- Watch: Open Source Supply Chain Security: A Visualization of the Checkmarx Solution, plus the Checkmarx channel on YouTube has excellent explanatory videos for tactics, techniques and procedures in the supply chain security domain, for example: Large Scale Campaign Created Fake GitHub Projects Clones with Fake Commit Added Malware
And a collection of reads and listens, ranging from insightful blog posts, explainers/all-rounders and some long-form analysis (we've tried to keep deep dive reads scoped to other sections)
- Secure Software Development Fundamentals Courses - Open Source Security Foundation
- Census II of Free and Open Source Software — Application Libraries
- “Chain”ging the Game - how runtime makes your supply chain even more secure
- How to attack cloud infrastructure via a malicious pull request
- Introducing StepSecurity Developer MDM, on protecting developer machines and AI coding agents from supply chain attacks targeting credentials, IDE extensions and local dependencies
- The Challenges of Securing the Open Source Supply Chain
- What is a Software Supply Chain Attestation - and why do I need it?
- Open Policy Agent 2021, Year in Review
- Reproducibility · Cloud Native Buildpacks and Buildpacks and SBOM Integration Opportunities
- The state of software bill of materials: SBOM growth could bolster software supply chains
- Watch: FOSDEM 2025 - Where in the OSS supply chain do SBOM attributes come from? by Salve J. Nilsen on SBOM metadata sourcing, authorization, and the landscape of regulatory demands (NIS2, Cyber Resilience Act)
- Watch: FOSDEM 2024 - SBOMs that you can trust: The Good, The Bad and the Ugly on SBOM trustworthiness across generation, storage, distribution, and processing using in-toto attestations, SLSA, CAS, and Sigstore
- Watch: FOSDEM 2024 - How to make SPDX industry standard for AI/ML on extending SPDX 3.0 adoption to AI/ML communities, covering SBOMs for data and data pipelines
- Watch: FOSDEM 2023 - Git Checkout Authentication to the Rescue of Supply Chain Security on authenticating Git checkouts, reproducible builds, and provenance tracking in GNU Guix
- Watch: Lock the Chef in the Kitchen: Enabling Accurate SBOMs Via Hermetic Builds by Adam Cmiel (Red Hat) on using Hermeto to pre-fetch dependencies and enable hermetic builds for accurate SBOM generation
- Watch: LLM Compressor Hermetic Build Demo by Konflux CI demonstrating hermetic build practices
- Watch: From SBOM Basics To Automation: A Beginner's Journey in Extracting ELF Binary Dependencies by Takashi Ninjouji (OpenSSF) on practical SBOM automation and binary analysis
- Watch: Lessons Learned from Generating 100M SBOMs: Google's Approach to SBOM Compliance from CNCF on Google's experiences and best practices for large-scale SBOM generation and compliance
- Secure Your Software Supply Chain with New VMware Tanzu Application Platform Capabilities
- A few resources to understand supply chain compromises:
- Supply Chain Compromise - attackics
- tag-security/supply-chain-security/compromises at main · cncf/tag-security
- IQTLabs/software-supply-chain-compromises: A dataset of software supply chain compromises. Please help us maintain it!
- Atlantic Council Software Supply Chain Security — The Dataset, an interactive dashboard and downloadable dataset of 250+ software supply chain attacks and disclosures, filterable by scale, timing, actors, codebase, and attack vectors
- Taxonomy of Attacks on Open-Source Software Supply Chains and Risk Explorer for Software Supply Chains
- Endor Labs' version: Risk Explorer for Software Supply Chains
- See also: SAP-samples/risk-explorer-execution-pocs, runnable PoC implementations demonstrating how 3rd-party dependencies can achieve arbitrary code execution at install time and runtime across multiple ecosystems (Python, JavaScript, Ruby, PHP, Rust, Go, Java)
- Also see a classic, Backstabber's Knife Collection: A Review of Open Source Software Supply Chain Attacks
- Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages
- Read: RepoAudit: Autonomous Repository-Level Code Auditing with LLMs, an LLM-based agent using data-flow analysis and validation to detect bugs and vulnerabilities in codebases with 78.43% precision while reducing hallucinations
- The Software Supply Chain Security Threat Landscape dispatches from Checkmarx are often fresh reading
- ossf/oss-compromises: Archive of various open source security compromises
- Python-specific example: Bad actors vs our community: detecting software supply chain... by Ajinkya Rajput and Ashish Bijlani
- A comprehensive all rounder: Protect Yourself Against Supply Chain Attacks - Rob Bos - NDC Security 2022
- Read: Mitigating Software Supply Chain Attacks: A Systematic Mapping of Attack Techniques to Framework Tasks, analyzing how NIST SSDF and 9 other frameworks mitigate real attack techniques from SolarWinds, Log4j, and XZ Utils, identifying priority mitigation tasks and gaps
- Watch: What Is This Package Even Doing? Analyzing Behaviors of Our Software Dependencies by Isaac Dawson, OpenSSF - examining runtime behavior analysis of package dependencies
- Not supply chain security specific, but worth tracking: PayDevs/awful-oss-incidents: 🤬 A categorized list of incidents caused by unappreciated OSS maintainers or underfunded OSS projects. Feedback welcome!
- Improving TOFU (trust on first use) With Transparency
- Read: Supply Chain Attacks are Exploiting Our Assumptions (Trail of Bits), analyzing implicit trust assumptions in package managers and recent attacks that exploit them
- Read: Guard Your Codebase: Practical Steps and Tools to Prevent Malicious Code (Apiiro), discussing malicious code detection patterns and strategies with open-source tools including malicious-code-ruleset for Semgrep and PRevent for pull request scanning
- Watch: AI-BOM Workshop at RSA Conference 2024 - Comprehensive workshop on AI software supply chain security and AI Bill of Materials (AI-BOM) covering ecosystem best practices with industry leaders and CISA representatives, including recorded lightning talks
- Reports:
- End-to-end demos and examples:
- Using SARIF to Extend Analysis of SAST Tools
- GitLab's Software Supply Chain Security section
- Also read GitLab's Software Supply Chain Security Direction
- GitHub's SARIF support for code scanning
- Driving Developer Productivity via Automated Dependency Tracking
- Code scanning finds more vulnerabilities using machine learning
- Securing Open Source Software at the Source
- Security: The Value of SBOMs
- Why SBOMS & Security Scanning Go Together - Upstream: The Software Supply Chain Security Podcast presented by Anchore
- SBOMs in the Windows Supply Chain, from the SPDX User Group
- Whose Sign Is It Anyway? - Marina Moore, NYU & Matthew Riley, Google
- Watch: True Security: Unforgeable Baseline Compliance - Adolfo García Veytia, OpenSSF, on establishing cryptographically verifiable security baselines
- Binary Authorization for Borg: how Google verifies code provenance and implements code identity
- Application Security Weekly (Video) on Apple Podcasts
- How to prioritize the improvement of open source software security
- Software Supply Chain Security Turns to Risk Mitigation
- Reproducible Builds: Increasing the Integrity of Software Supply Chains
- sigstore/community: General sigstore community repo
- CycloneDX Use Cases
- Listen: #6: Steve Springett: CycloneDX and the Future of SBOMs - Cybellum
- Watch: CycloneDX and the Cloud from OWASP CycloneDX
- Building a Sustainable Software Supply Chain, particularly the section: "The Software Supply Chain Sustainability Maturity Model"
- Dependency Issues: Solving the World’s Open Source Software Security Problem offers a well meditated view on the problem space as well
- The Digital Economy Runs on Open Source. Here’s How to Protect It (HBR)
- Report: 95% of IT leaders say Log4shell was ‘major wake-up call’ for cloud security
- Presentation: Securing the Open Source Software Supply Chain at PyConUS2022 by Dustin Ingram
- Watch: The state of open source security in 2022 with Kurt Seifried
- Podcast: Kubernetes Podcast from Google: Episode 174 - in-toto, with Santiago Torres-Arias
- EO 14028 and Supply Chain Security
- Reducing Open Source Risk Throughout the Development, Delivery and Deployment of SBOMs, a May 2022 paper illustrating at a high level the differences between SBOMs in publishing, distribution and delivery scenarios; see pages 6-9
- Open Source Security Foundation (OpenSSF) Security Mobilization Plan
- Not Just Third Party Risk
- Read: NIST Provides Solid Guidance on Software Supply Chain Security in DevSecOps (CSO Online) - Overview of NIST SP 800-204D on integrating supply chain security into CI/CD pipelines with recommendations for secure builds, artifact management, and zero-trust principles
- Read: How Golang Manages Its Security Supply Chain (The New Stack) - Overview of Go's supply chain security practices including checksums, CapsLock, OSS-Fuzz, SBOMs and vulnerability databases
- Open Source Security: How Digital Infrastructure Is Built on a House of Cards
- Read: Kink in the Chain: Eight Perspectives on Software Supply Chain Risk Management from the Atlantic Council, featuring policy and industry perspectives on threats, tools, and government initiatives
- Series: Bootstrapping Trust Part 1 covering encryption, certificates, chains and roots of trust
- Contact sign-up sheet required: The Rise of Continuous Packaging by Cloudsmith and O'Reilly
- Supply Chain Security for Cloud Native Java (from Thomas Vitale)
- Podcast: It Depends with Trail of Bits
- New security concerns for the open-source software supply chain (top level findings from The State of the Software Supply Chain: Open Source Edition 2022)
- Software Supply Chain Primer v0.93 (June 2022)
- Research Case Study: Supply Chain Security at Scale – Insights into NPM Account Takeovers (November 2024)
- Read: How Cloudflare's client-side security made the npm supply chain attack a non-event on detecting malicious JavaScript in npm packages using ML-based Abstract Syntax Tree analysis and graph neural networks