Based on our record, OWASP Dependency-Track should be more popular than The Update Framework. It has been mentiond 19 times since March 2021. We are tracking product recommendations and mentions on various public social media platforms and blogs. They can help you identify which product is more popular and what people think of it.
The Update Framework (TUF): TUF is a framework, not a tool, designed to enhance the security of software update systems. It focuses on resilience against key compromises and attacks, employing verifiable records to verify the authenticity of update files. TUF's flexibility and integration ease make it a foundational element in securing software updates, though it's not a direct image signing tool like the others. - Source: dev.to / 7 months ago
Here’s to hoping they employ some security to prevent the machines from being hacked and attacking our own infra ala TUF (https://theupdateframework.io/) or the tech from Foundries.io. - Source: Hacker News / 10 months ago
Release signing—or attestation—was a hot topic at KubeCon among vendors, with many offering their own solutions. One in particular that stood out was CNCF’s recently graduated The Update Framework (TUF). - Source: dev.to / about 1 year ago
One of the other solution for signature and handling their upgrade is https://theupdateframework.io/ . Haven't come around implementing it yet, but it sounds like a robust solution to this problem. Have you looked at it before? Source: over 1 year ago
I've become interested in SBOM recently, and found there were great tools like https://dependencytrack.org/ for CycloneDX SBOMs, but all I have is SPDX SBOMs generated by GitHub. I decided to have a go at writing my own dependency track esque tool aiming to integrate with the APIs GitHub provides. It's pretty limited in functionality so far, but can give a high level summary of the types of licenses your... - Source: Hacker News / about 2 months ago
To detect these types of vulnerabilities, we should first and foremost know our dependencies and versions, and which of them have vulnerabilities. The OWASP Top 10 2021 identifies this need as A06:2021-Vulnerable and Outdated Components. OWASP has several tools for this, including Dependency Check and Dependency Track. These tools will warn about the use of components with vulnerabilities. - Source: dev.to / 2 months ago
Https://dependencytrack.org/ You just need to use one of the various tools out there to scan. - Source: Hacker News / 8 months ago
OWASP Dependency Track - https://dependencytrack.org/. Source: about 1 year ago
I actually want to build the same thing you are after, and I think I’ll go for the setup you describe in idea 2. The tool you can use for this is Trivy (https://trivy.dev), have it generate a SBOM and send it to Dependencytrack (https://dependencytrack.org). Source: over 1 year ago
Anchore - Achore offers end to end security and compliance tools to help deploy containers with confidence.
Snyk - Snyk helps you use open source and stay secure. Continuously find and fix vulnerabilities for npm, Maven, NuGet, RubyGems, PyPI and much more.
Kubescape - Kubernetes security made for developers
FOSSA - Open source license compliance and dependency analysis
Sysdig Falco - Runtime Security
WhiteSource - Find & fix security and compliance issues in open source libraries in real-time.