#SLSA

πŸ…±πŸ…ΈπŸ…ΆπŸ…ΎπŸ†πŸ†πŸ…΄.πŸ…ΎπŸ†πŸ…Άbigorre_org
2025-05-04

Aviation weather for Santa Ana Del Yacuma airport (Bolivia) is β€œSLSA 041100Z 12004KT 9999 SCT004 SCT070 25/24 Q1013” : See what it means on bigorre.org/aero/meteo/slsa/en vl

Caleb Woodbine πŸŽΊπŸ›calebwoodbine@mastodon.nz
2025-02-25

Tomorrow I'm speaking at the Auckland Kubernetes Meetup.
Alongside Jonas, who is talking about "AI Assisted DevSecOps", I'm talking about "Secure software supply chain with Sigstore".

meetup.com/auckland-kubernetes

Hope to see you there!

#kubernetes #cncf #auckland #sigstore #slsa

2024-12-10

Join Harsh Thakur (Civo) & Saiyam Pathak (Loft Labs) as they talk about practical steps for achieving #SLSA compliance:

βœ”οΈ Generating SBOMs & provenance
βœ”οΈ Keyless attestations with cosign
βœ”οΈ Hermetic builds with Buildkit

πŸ“ #SOSSCommunity Day India

Derek | ScriptAutomatescriptautomate@fosstodon.org
2024-09-08

Wondering whether users of #cosign (by #sigstore) and #slsa (slsa-verifier) would have opinions on how to best make use of these verification tools when downloading binaries for use in container images?

I started a StackOverflow discussion here with more details, since I'm new to playing around with these toolchains:

stackoverflow.com/beta/discuss

2024-04-25

@dolmen Many systems are based on #bootstrapping and #reproducableBuilds
β€’ bootstrappable.org/
β€’ reproducible-builds.org/
β€’ en.wikipedia.org/wiki/Bootstra

These ensure that the build system integrity cannot be tampered with. One example of such system is openbuildservice.org/

Here's a great read on the topic from #SUSE : documentation.suse.com/sbp/ser

Generally Supply-chain Levels for Software Artifacts (#SLSA) framework is a great resource on this topic: slsa.dev/ #cybersecurity #infosec

David Lord :python:davidism@mas.to
2024-04-24

slsa-github-generator v2 now uses upload/download-artifact v4, so I can update those in all the Pallets projects. Turns out the publish workflow for most projects didn't need any changes at all. Only MarkupSafe, with multiple build jobs, needed a little change to use different upload names and combine their downloads. github.com/pallets/markupsafe/ #Python #Flask #MarkupSafe #GitHub #SLSA

2024-03-30

To explain, we have #SLSA signatures that verify the build was done automatically by #GitHub as instructed, *and* we have traditional #gpg signatures with private keys only known to maintainer(s) that verify a maintainer actually triggered the built and locally reproduced it…
Given they both validate, you automatically achieve reproducible builds _and_ #SLSA validity.

One caveat: This was only easy, because our build process is essentially one command (git archive).

github.com/PrivateBin/PrivateB

2024-03-30

The way this works, is, essentially, quite easy: the whole build process is documented in the same repository, builds are automated via CI/CD and all that is, to reach best support, done in an environment that prevents tampering and (crucially) is *out of your control*.

Then you get #SLSA v3: slsa.dev/get-started#slsa-3 (quite easy with GitHub Actions)

2024-03-30

Note on all the #xz drama, there are some technical solutions for such #supplychainattack that can make such an attack way harder, at least to hide the code in tarballs etc.

slsa.dev/ e.g. is a solution. Combined with reproducible builds, it ensures that a software artifact is built exactly from the source given in a source repository, with the possibility to prove that and no way for any maintainer to tamper with (in the highest level).

#slsa #infosec #security #linux #backdoor

Thomas Strâmberg ∴ KD4UHPthomrstrom@triangletoot.party
2024-03-12

I've decided to try my hand at speaking at IT Security conferences: I've got one rejected CFP so far, but today I proposed another for BSides Boulder:

"Preventing SolarWinds 2.0: #SLSA isn't gonna save you".

Stewart X Addisonsxa@fosstodon.org
2024-01-26

#Adoptium has finalised the releases of the January #Temurin #openjdk updates - jdk 8u402, 11.0.22, 17.0.10 and 21.0.2.
This is the first JDK21 release to include AIX and Linux/s390x platforms, and the release is #SLSA build level 3 compliant on Linux and macOS platforms.
adoptium.net/blog/2024/01/ecli

2024-01-11

Beach safety for humans in a more-than-human world
Have drones at the beach, repel birds

Beachgoers are warned with larges signs of a drone operating at Sawtell beach. The warning posters for the aerial operations states that they have the rationale to keep human beings safe. The unmanned aerial vehicle makes an irritating buzzing sound while flying over the heads of beachgoers.

The beauty of Sawtell beach is usually to share the ambience with shorebirds, birds of prey and little terns. With the loud gadget droning up and down the beach no bird or endangered shorebird was visible or audible. The scarecrow in the sky, the jet skis and car on the sand make sure the beach is just for one species alone.

Drones are disturbing critically endangered shorebirds in Moreton Bay, creating a domino effect
theconversation.com/drones-are

Human safety, The Civil Aviation Safety Authority
casa.gov.au/knowyourdrone

Sawtell - Threatened Shorebirds. The Threatened Shorebirds program shares the plight of these incredible shorebirds, including Little terns, Pied oyster catchers and Beach stone curlews
coffsharbour.nsw.gov.au/Eventb

#Sawtell #SawtellBeach #UAVs #regulation #drones #gadgets #CASA #SLSA #SurfLifeSaving #safety #IndustrialisedBeaches #birds #Shorebirds #ThreatenedShorebirds #wildlife #ShareTheBeach

Drones at Sawtell beach, No shorebirds
Andrew Lilley Brinkeralilleybrinker@hachyderm.io
2024-01-02

If I could pick one software supply chain security thing for people to look at in the new year, it would be the Secure Supply Chain Consumption Framework. It describes in detail how to manage risk associated with software dependencies.

I consider this more important than SBOMs or SLSA.

Check it out! github.com/ossf/s2c2f

#sbom #slsa #s2c2f

Sam Stepanyan :verified: 🐘securestep9@infosec.exchange
2024-01-02

#SLSA: #Macaron is an extensible supply chain security analysis framework from Oracle which integrates with existing #SBOM in OWASP #CycloneDX

#SoftwareSupplyChainSecurity

πŸ‘‡
github.com/oracle/macaron

Stewart X Addisonsxa@fosstodon.org
2023-12-01

My colleague Scott Fryer gave a talk at this year's @EclipseFdn 's #EclipseCon on #Adoptium's secure development practices, what we've done and what we're going to do going forward. It covers #SLSA, #SSDF, #SBoM, binary #reproducibleBuilds and keeping a heterogeneous #openSource project's infrastructure secure with #Wazuh

If some of those buzzwords have piqued your interest (or you want to know what they are) checkout his video: youtube.com/watch?v=mpEKUnX84U
#secureDev #CycloneDX

2023-10-20

Highlights from our SLSA Tech Talk πŸ’ƒ + additional Q&As we didn't have time for during the live session & where to watch on demand: openssf.org/blog/2023/10/20/sl Securing the Software Supply Chain: An In-Depth Exploration of #SLSA

devguy :verified:developerguy@hachyderm.io
2023-10-11

πŸš€ Exciting News! We've just released a new blog post!

πŸ“ In this article, we explore the world of software supply chain security, offering insights into how to safeguard the integrity of your binaries and container images using two powerful tools! ⚑️

πŸ’ƒ Dive into the capabilities of SLSA provenances for enhanced security.πŸ’»

πŸ‘ A big shoutout to @furkanturkaI and @caarlos0 for their invaluable contributions!

goreleaser.com/blog/slsa-gener

#SLSA #DevSecOps #OpenSource #goreleaser #slsaverifier #cosign 🌟

devguy :verified:developerguy@hachyderm.io
2023-10-10

πŸŽ‰ Incredible news! πŸš€ I've successfully generated #SLSA provenance for binaries and container images via @GoReleaser and slsa-github-generators. πŸ“¦πŸ”’ Thrilled to showcase this achievement! πŸ™Œ #OpenSource #Security

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst