Categories

Resources categorized "Open Source Security"

There are a total of (8) items.

Link to Capturing the productivity gains of AI coding assistants without sacrificing control of privacy

Capturing the productivity gains of AI coding assistants without sacrificing control of privacy

Luke Hinds /
Dec 17, 2024
Continue Reading
Link to Now available in Trusty: Vulnerability and license information for open source packages

Now available in Trusty: Vulnerability and license information for open source packages

Megan Bruce /
Aug 27, 2024
Continue Reading
Link to 5 risk factors of open source software beyond CVEs

5 risk factors of open source software beyond CVEs

Stacklok Editorial Team /
Aug 20, 2024
Continue Reading
Link to Introducing the Trusty Dependency Risk Action: Automatically scan PRs for unsafe dependencies

Introducing the Trusty Dependency Risk Action: Automatically scan PRs for unsafe dependencies

Megan Bruce /
Jul 18, 2024
Continue Reading
Link to CVEs: The emperor's old clothes

CVEs: The emperor's old clothes

Luke Hinds /
Feb 21, 2024
Continue Reading
Link to Announcing Go support in Trusty: Vet the safety of your open source Go dependencies

Announcing Go support in Trusty: Vet the safety of your open source Go dependencies

Stacklok /
Feb 9, 2024
Continue Reading
Link to The importance of historical provenance in identifying malicious packages
Historical provenance: Mapping Git tags to package versions to verify proof of origin for OSS packages

The importance of historical provenance in identifying malicious packages

Nigel Brown /
Jan 15, 2024
Continue Reading
Link to Introducing Java support in Trusty: Find safe Maven open source packages for your next Java project

Introducing Java support in Trusty: Find safe Maven open source packages for your next Java project

Brian Dussault /
Dec 20, 2023
Continue Reading