{"id":13533001,"url":"https://github.com/grafeas/kritis","last_synced_at":"2025-05-14T20:04:09.048Z","repository":{"id":40601794,"uuid":"136964513","full_name":"grafeas/kritis","owner":"grafeas","description":"Deploy-time Policy Enforcer for Kubernetes applications","archived":false,"fork":false,"pushed_at":"2025-04-14T15:58:40.000Z","size":33602,"stargazers_count":703,"open_issues_count":84,"forks_count":136,"subscribers_count":24,"default_branch":"master","last_synced_at":"2025-04-14T23:18:17.619Z","etag":null,"topics":[],"latest_commit_sha":null,"homepage":"https://github.com/grafeas/kritis/blob/master/docs/binary-authorization.md","language":"Go","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"apache-2.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/grafeas.png","metadata":{"files":{"readme":"README.md","changelog":"CHANGELOG.md","contributing":"CONTRIBUTING.md","funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":"SECURITY.md","support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2018-06-11T18:19:43.000Z","updated_at":"2025-03-12T08:10:05.000Z","dependencies_parsed_at":"2023-01-24T10:46:19.309Z","dependency_job_id":"52eee127-f298-43c9-b330-e9f18be2cb2f","html_url":"https://github.com/grafeas/kritis","commit_stats":null,"previous_names":[],"tags_count":7,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/grafeas%2Fkritis","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/grafeas%2Fkritis/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/grafeas%2Fkritis/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/grafeas%2Fkritis/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/grafeas","download_url":"https://codeload.github.com/grafeas/kritis/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":248975329,"owners_count":21192210,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":[],"created_at":"2024-08-01T07:01:15.707Z","updated_at":"2025-04-14T23:18:32.299Z","avatar_url":"https://github.com/grafeas.png","language":"Go","readme":"# Kritis\n\n[![GoDoc Widget]][GoDoc]\n[![BuildStatus Widget]][BuildStatus Result]\n[![GoReport Widget]][GoReport Status]\n\n[GoDoc]: https://godoc.org/github.com/grafeas/kritis\n[GoDoc Widget]: https://godoc.org/github.com/grafeas/kritis?status.svg\n\n[BuildStatus Widget]: https://app.travis-ci.com/github/grafeas/kritis\n\n[GoReport Status]: https://goreportcard.com/report/github.com/grafeas/kritis\n[GoReport Widget]: https://goreportcard.com/badge/github.com/grafeas/kritis\n\n\n![Kritis logo](logo/logo-128.png)\n\nKritis (“judge” in Greek), is an open-source solution for securing your software supply chain for Kubernetes applications. Kritis enforces deploy-time security policies using the [Google Cloud Container Analysis API](https://cloud.google.com/container-analysis/api/reference/rest/), and in a subsequent release, [Grafeas](https://github.com/grafeas/grafeas).\n\nHere is an example Kritis policy, to prevent the deployment of Pod with a critical vulnerability unless it has been allowlisted:\n\n```yaml\nimageAllowlist:\n- gcr.io/my-project/allowlist-image@sha256:\u003cDIGEST\u003e\npackageVulnerabilityPolicy:\n  maximumSeverity: HIGH\n  allowlistCVEs:\n    - providers/goog-vulnz/notes/CVE-2017-1000082\n    - providers/goog-vulnz/notes/CVE-2017-1000081\n```\n\nIn addition to the enforcement this project also contains *signers* that can be\nused to create [Grafeas](https://github.com/grafeas/grafeas) Attestation\nOccurrences to be used in other enforcement systems like [Binary\nAuthorization](https://cloud.google.com/binary-authorization/).  (TODO#571: add doc and fix link)\nFor details see upcoming doc [Kritis Signer](docs/signer.md).\n\n## Getting Started\n\n* Watch the talk on [Software Supply Chain Management with Grafeas and Kritis](https://www.infoq.com/presentations/supply-grafeas-kritis/).\n* Learn the concepts in the [Kritis Whitepaper](docs/binary-authorization.md).\n* Try out Kritis with standalone Grafeas by following [Standalone Mode Tutorial](docs/standalone/README.md)\n* Try the [Tutorial](docs/tutorial.md) to learn how to block vulnerabilities using [GCP Container Analysis](https://cloud.google.com/container-registry/docs/get-image-vulnerabilities).\n* Read the [Resource Reference](docs/resources.md) to configure and interact with Kritis resources.\n\n## Support\n\nIf you have questions, reach out to us on\n[kritis-users](https://groups.google.com/forum/#!forum/kritis-users). For\nquestions about contributing, please see the [section](#contributing) below.\n\n## Contributing\n\nSee [CONTRIBUTING](CONTRIBUTING.md) for details on how you can contribute.\n\nSee [DEVELOPMENT](DEVELOPMENT.md) for details on the  development and testing workflow.\n\n## License\n\nKritis is under the Apache 2.0 license. See the [LICENSE](LICENSE) file for details.\n","funding_links":[],"categories":["Supply chain specific tools","Security \u0026 Compliance","Kubernetes Admission Controller","Go","Point-of-use validations"],"sub_categories":["Vulnerability information exchange"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fgrafeas%2Fkritis","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fgrafeas%2Fkritis","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fgrafeas%2Fkritis/lists"}