sysdiglabs
Grow your team on GitHub
GitHub is home to over 50 million developers working together. Join them to grow your own development teams, manage permissions, and collaborate on projects.
Sign upRepositories
python-sdc-client
Sysdig Monitor/Secure Python client library
sysdig-operator
Sysdig agent Operator configure Sysdig platform in your Kubernetes cluster
terraform-provider-sysdig
Sysdig Terraform provider. Allow to handle Sysdig Secure policies as code.
stackdriver-webhook-bridge
Forward and Convert GKE K8s Audit Events to Falco/Sysdig Agent
hello-world-node-vulnerable
The Node.js official "hello world" containerized node example, useful as an image scanning example also
promcat-frontend
Forked from falcosecurity/cloud-native-security-hub-frontendPrometheus Catalog - Frontend
promcat-backend
Forked from falcosecurity/cloud-native-security-hub-backendPrometheus Hub - Backend
kube-psp-advisor
Help building an adaptive and fine-grained pod security policy
harbor-scanner-sysdig-secure
Use Sysdig Secure as a plug-in vulnerability scanner in the Harbor registry
aks-audit-log
Instructions and code to connect Azure Kubernetes Service audit logs to Sysdig agent
opa-image-scanner
Kubernetes Admission Controller for Image Scanning using OPA
ekscloudwatch
Forward EKS CloudWatch k8s audit events to Sysdig secure
dummy-vuln-app
Flask application with vulnerabilities
scan-action
Inline Image Scan Github Action
kube-apparmor-manager
Manage AppAmormor profiles for Kubernetes cluster
image-scanning-admission-controller
Kubernetes admission controller that validate image in deployment is vulnerability free
security-playground
This is a sample application which runs an HTTP web server and allows to read and write files and exec commands
benchmark-dockerfile
Github action to benchmark dockerfiles in github repository.
k8s-security-configwatch
Git action to generate security lint report for Kubernetes workload YAML files on PR
se-workshop
SE workshop
terraform-icp-aws
Forked from ibm-cloud-architecture/terraform-icp-awsThis Terraform configurations uses the AWS provider to provision virtual machines on AWS to prepare VMs and deploy IBM Cloud Private on them. This Terraform template automates best practices learned from installing ICP on AWS at numerous client sites in production.
kubectl-capture
A kubectl plugin which triggers a Sysdig capture