Skip to content

Commit 4a68267

Browse files
authored
docs: add a screencast for Django analysis (#1220)
Signed-off-by: behnazh-w <[email protected]>
1 parent b762755 commit 4a68267

File tree

2 files changed

+6
-0
lines changed

2 files changed

+6
-0
lines changed

README.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,12 @@ Macaron supports:
1818
- **Reproducible build** through static analysis of build scripts. Macaron enables **rebuilding packages from source** and **comparing to released artifacts** to detect discrepancies, and therefore compromised workflows or artifacts ([paper](https://arxiv.org/pdf/2410.08427)).
1919
- **Accurate repository and commit detection** for released artifacts, improving traceability and trust ([tutorial](https://oracle.github.io/macaron/pages/tutorials/source_finder.html)).
2020

21+
## Demo: Analyzing Django with Dependencies
22+
23+
This screencast shows how Macaron analyzes the `[email protected]` Python package and its dependencies. Macaron runs the same set of checks, including malware detection, on the dependencies as it does on the Django package. You can either generate a Software Bill of Materials (SBOM) manually or point Macaron to a virtual environment where Django is installed to automatically analyze the entire dependency tree. The policy engine ensures that the malware detection check passes for all packages in the dependency tree.
24+
25+
![Demo](./docs/source/assets/macaron_0.18.0_demo.gif)
26+
2127
## Based on SLSA
2228

2329
Macaron follows the recommendations of the [SLSA (Supply chain Levels for Software Artifacts)](https://slsa.dev) framework. It offers a flexible, extensible policy engine for checking compliance with SLSA levels. Users can define and compose custom rules tailored to their CI/CD practices and security needs.
893 KB
Loading

0 commit comments

Comments
 (0)