From 7b779d1b5b1c20e927cf7eb62f81babafe46e96b Mon Sep 17 00:00:00 2001 From: "weiwei.danny" Date: Tue, 14 Jan 2025 11:30:40 +0800 Subject: [PATCH] Add vArmor to landscape Signed-off-by: weiwei.danny --- hosted_logos/varmor.svg | 1 + landscape.yml | 12 ++++++++++++ 2 files changed, 13 insertions(+) create mode 100644 hosted_logos/varmor.svg diff --git a/hosted_logos/varmor.svg b/hosted_logos/varmor.svg new file mode 100644 index 00000000000..9780e49ffd5 --- /dev/null +++ b/hosted_logos/varmor.svg @@ -0,0 +1 @@ +vArmor \ No newline at end of file diff --git a/landscape.yml b/landscape.yml index 5c30d07e7d1..5e02817d15a 100644 --- a/landscape.yml +++ b/landscape.yml @@ -2161,6 +2161,18 @@ landscape: logo: trivy.svg crunchbase: https://www.crunchbase.com/organization/aquasecurity twitter: https://x.com/aquatrivy + - item: + name: vArmor + description: >- + vArmor is a cloud-native container sandbox system. It leverages Linux's AppArmor LSM, BPF LSM and Seccomp technologies to implement enforcers. + It can be used to strengthen container isolation, reduce the kernel attack surface, and increase the difficulty and cost of container escape or + lateral movement attacks. It includes multiple built-in protection rules that are ready to use out of the box. + homepage_url: https://varmor.org + repo_url: https://github.com/bytedance/vArmor + logo: varmor.svg + crunchbase: https://www.crunchbase.com/organization/bytedance + extra: + summary_tags: security,runtime security,container hardening,violation auditing - item: name: Veinmind Tools description: veinmind-tools is self-developed by chaitin technology, cloudwalker team incubation, a container security toolset based on veinmind-sdk