Skip to content

Release Security Checks

Key Insight

Release security ensures artifacts are signed and properly distributed.

Checks that measure release security practices including signatures, provenance, distribution, and licensing.

Covered Checks

Signed-Releases

Target: 10/10 with SLSA provenance

What it checks: Whether releases have cryptographic signatures and SLSA provenance

Why it matters: Proves artifacts weren't tampered with between build and distribution

Effort: 2-4 hours

Priority: High (required for SLSA compliance)

Advanced: Signed-Releases Advanced Guide


Packaging

Target: 10/10 by publishing to package registries

What it checks: Whether project is published to recognized package registries

Why it matters: Demonstrates wider distribution and established ecosystem integration

Effort: 1-2 hours

Priority: Medium (improves discoverability)


License

Target: 10/10 with OSI-approved license

What it checks: Whether repository contains OSI-approved open source license

Why it matters: Legal clarity for contributors and users

Effort: 5 minutes

Priority: High (quick win)


Check Summary

Check Target Effort Priority Weight
License 10/10 5 min High Low
Packaging 10/10 1-2 hrs Medium Low
Signed-Releases 10/10 2-4 hrs High High

Remediation Priority Order

Order of implementation for fastest improvement:

  1. License (5 minutes) - Add LICENSE file
  2. Packaging (1-2 hours) - Publish to package registry
  3. Signed-Releases (2-4 hours) - Implement SLSA provenance

Total estimated effort: 3-6 hours for all three checks.

Check Interactions

Signed-Releases + Binary-Artifacts:

SLSA provenance proves binaries were built from source in trusted environment.

Packaging + Signed-Releases:

Package registries often require signatures for publishing, making these complementary.

License + CII-Best-Practices:

OSI-approved license is required for OpenSSF Best Practices Badge.

Other check categories:

Guides:

Next Steps

  1. Quick win: Add LICENSE file (5 minutes)

  2. Publish package: Set up package registry publishing (1-2 hours)

  3. SLSA provenance: Implement slsa-github-generator (2-4 hours)

Remember: License is immediate. Packaging demonstrates maturity. Signed-Releases is required for SLSA compliance.


Release security demonstrates supply chain integrity. Start with License, add Packaging for visibility, then implement Signed-Releases for provenance.

Comments