Area
Supply Chain
Status
Planning
Sponsors
-
Funding
More Funding Required

Goals

Implement SLSA Build Provenance

Impact

By integrating SLSA Build Provenance into Hex’s publishing and installation workflows, this milestone provides a transparent, verifiable chain of custody for packages, strengthening trust between developers and end-users. Implementing sigstore and SLSA libraries, generating attestations on critical events, and enabling Build Tools (mix, rebar3, Gleam) to produce and verify provenance all contribute to a more secure and auditable software supply chain. By offering Level 3 publishing capabilities and maintaining a transparency log accessible via the Hex.pm API, users gain robust assurance that packages are built and signed under trustworthy conditions, ultimately reducing the risk of tampering and enabling higher security standards across the Erlang and Elixir ecosystems.

Deliverables

  • Implement sigstore standalone library written in erlang that passes the conformance tests
  • Implement slsa standalone verification library
  • Build Tool Hex Publish can optionally generate SLSA Provenance (mix, rebar3, gleam)
  • Provide SLSA L3 Publisher for GitHub and if ready, GitLab
  • Hex.pm Registry will create attestation on events linking build provenance if possible
    • Events: publish, unpublish, retire, Vulnerability publish, VEX publish, maintainer / owner changes
    • See NPM
  • Build Tool Hex Installation can verify Publish Attestation & SLSA Provenance
  • All Attestations can be queried via the API as a Transparency Log

Relevant Standards