-
Notifications
You must be signed in to change notification settings - Fork 19
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Notifications of new VEX #9
Comments
Hey @pdxjohnny, We don't have any at the moment, this week we started discussing some of the discovery/delivery means for OpenVEX data in the community call. It is not yet online on the OpenSSF youtube channel but be sure to check it out when it's uploaded (community meeting of Jun 12th). We are working on the tooling to publish OpenVEX data through repositories and OCI registries, but I'm sure the SIG would love to hear more ideas, please feel free to join and share your thoughts. |
Awesome!! I appreciate you letting me know. Glad to hear others are going with OCI registries as well. https://oras.land tooling has been helpful. |
Above linked PR mentions claims with payload as VEX for reference to in SCITT and leveraging federation to receive events of new VEX ^ From @charliehart
OpenVEX’s JSON-LD definition might be helpful for those connections. |
Are there any docs on how it is envisioned downstreams can be notified of new VEX? Hoping we can see this eventing integrated into transparency log infra federation to enable automated evaluation on new vulns via recursive application of policy and context local transparency services (see ID security threats WG notes in linked SCITT PR).
The text was updated successfully, but these errors were encountered: