Image signing and security
Image Signing¶
The image is signed using cosign by sigstore. You can verify any v3+ image using the below or the key associated with that release.
Public key¶
-----BEGIN PUBLIC KEY-----
MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEPU9CpTEhHeNOpkQ7/oiBSbhYuxnC
4jnZ1BB7oOK91iLMEI3YjoqFvRRBQbmba8Cjh3HOvmLBFEukA1cOi+6J+g==
-----END PUBLIC KEY-----
Verify image¶
Vulnerability Scanning¶
We use grype by Anchore to handle image scanning. If any critical vulnerabilities are detected, the pipeline will fail.
The scan results should be available in the security tab of Github and as an artifact with each pipeline run.
Software Bill Of Materials (SBOM)¶
We use syft by Anchore to handle SBOM generation in spdx-json format. We upload it as an artifact with every pipeline run and as an asset for releases.