Categories

Resources categorized "Open Source Security"

There are a total of (7) items.

Link to Now available in Trusty: Vulnerability and license information for open source packages

Now available in Trusty: Vulnerability and license information for open source packages

Megan Bruce /
Aug 27, 2024
Continue Reading
Link to 5 risk factors of open source software beyond CVEs

5 risk factors of open source software beyond CVEs

Stacklok Editorial Team /
Aug 20, 2024
Continue Reading
Link to Introducing the Trusty Dependency Risk Action: Automatically scan PRs for unsafe dependencies

Introducing the Trusty Dependency Risk Action: Automatically scan PRs for unsafe dependencies

Megan Bruce /
Jul 18, 2024
Continue Reading
Link to CVEs: The emperor's old clothes

CVEs: The emperor's old clothes

Luke Hinds /
Feb 21, 2024
Continue Reading
Link to Announcing Go support in Trusty: Vet the safety of your open source Go dependencies

Announcing Go support in Trusty: Vet the safety of your open source Go dependencies

Stacklok /
Feb 9, 2024
Continue Reading
Link to The importance of historical provenance in identifying malicious packages
Historical provenance: Mapping Git tags to package versions to verify proof of origin for OSS packages

The importance of historical provenance in identifying malicious packages

Nigel Brown /
Jan 15, 2024
Continue Reading
Link to Introducing Java support in Trusty: Find safe Maven open source packages for your next Java project

Introducing Java support in Trusty: Find safe Maven open source packages for your next Java project

Brian Dussault /
Dec 20, 2023
Continue Reading