LinnemanLabs

Supply Chain Security

Modeling the hackerbot-claw Attack Against My Own CI/CD Pipeline
2026-03-20 · Keith Linneman
Reviewing my infrastructure's security posture against recent high-profile supply chain security compromises involving GitHub workflows using pull_request_target.
Running Your Own Transparency Infrastructure with Fulcio, Rekor, TesseraCT and Timestamp-Authority
2026-03-18 · Keith Linneman
From YubiKey CA root to trust bundles to signed artifacts - the architecture, trust decisions, and security implications behind running a self-hosted Sigstore stack.