- Home
- Application Security
- Software Composition Analysis
- Helm GPG (GnuPG) Plugin
Helm GPG (GnuPG) Plugin
Helm plugin for cryptographically signing and verifying charts with GnuPG integration.

Helm GPG (GnuPG) Plugin
Helm plugin for cryptographically signing and verifying charts with GnuPG integration.
Helm GPG (GnuPG) Plugin Description
Helm has the ability to cryptographically sign and verify charts. This plugin provides integration with GnuPG, making it easier to use than the default helm signing and verifying commands. It is also more secure, since it supports passphrase-encrypted keys. It offers two operations: - sign: Sign a chart with a key - verify: Verify a signed chart with your keyring Also check out the Helm Keybase plugin. Installation: You must have GnuPG's command line client (gpg) installed and configured. $ helm plugin install https://github.com/technosophos/helm-gpg
Helm GPG (GnuPG) Plugin FAQ
Common questions about Helm GPG (GnuPG) Plugin including features, pricing, alternatives, and user reviews.
Helm GPG (GnuPG) Plugin is Helm plugin for cryptographically signing and verifying charts with GnuPG integration.. It is a Application Security solution designed to help security teams with Plugin, GPG.
FEATURED
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs
POPULAR
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
A comprehensive educational resource that provides structured guidance on penetration testing methodology, tools, and techniques organized around the penetration testing attack chain.
TRENDING CATEGORIES
Stay Updated with Mandos Brief
Get strategic cybersecurity insights in your inbox