Supply Chain Security
Modeling the hackerbot-claw Attack Against My Own CI/CD Pipeline
2026-03-20
·
Keith Linneman
Reviewing my infrastructure's security posture against recent high-profile supply chain security compromises involving GitHub workflows using pull_request_target.
Running Your Own Transparency Infrastructure with Fulcio, Rekor, TesseraCT and Timestamp-Authority
2026-03-18
·
Keith Linneman
From YubiKey CA root to trust bundles to signed artifacts - the architecture, trust decisions, and security implications behind running a self-hosted Sigstore stack.