DEV Community

Kalyan Tamarapalli
Kalyan Tamarapalli

Posted on • Originally published at ktamarapalli.hashnode.dev

Wrapping Sigstore, in-toto, and SLSA: Where Modern Supply-Chain Security Still Fails

reference image

Why Provenance Without Intent Is Not Enough


Introduction: The Rise of Supply-Chain Frameworks

Sigstore, in-toto, and SLSA represent real progress in supply-chain security.

They provide:

  • Artifact signing
  • Provenance metadata
  • Policy enforcement
  • Reproducible build standards

These frameworks close many historical gaps.

But they share a common blind spot:

They authenticate artifacts and workflows.

They do not verify human intent.

This article examines where modern supply-chain frameworks stop — and why intent-verification must sit above them as a governance layer.


What These Frameworks Solve Well

Sigstore

  • Makes signing accessible
  • Eliminates long-lived keys
  • Anchors signatures in transparency logs

in-toto

  • Enforces workflow policy
  • Cryptographically links pipeline steps
  • Tracks who performed each stage

SLSA

  • Defines maturity levels
  • Enforces build isolation
  • Encourages reproducibility

These frameworks answer:

Did the pipeline follow policy?

They do not answer:

Did a human consciously approve this specific deployment right now?


The Shared Trust Domain Problem

All three frameworks perform signing and attestation within the same execution environment as the build.

This creates a shared trust domain.

Once that domain is compromised, the attacker can:

  • Sign malicious artifacts
  • Produce valid provenance
  • Satisfy policy checks

The pipeline verifies everything correctly.

And yet—

The trust model fails silently.


Provenance Without Intent

Provenance answers:

How was this artifact produced?

It does not answer:

Was this artifact intended by a human?

Attackers exploit this gap by injecting malicious behavior into otherwise policy-compliant workflows.

The pipeline remains compliant.

The outcome is malicious.


Why Intent Must Be a First-Class Primitive

High-risk actions — especially production deployments — require stronger guarantees than routine pipeline steps.

Intent-verification introduces:

  • Per-action human approval
  • Hardware-backed cryptographic proof
  • Physical separation of approval from execution

This creates a new layer:

Human-bound authorization, not just system-level validation


Composability, Not Replacement

Intent-verification is not a replacement for existing frameworks.

It is a governance layer on top of them.

It should:

  • Feed into Sigstore signing
  • Attach to in-toto layouts
  • Gate SLSA Level 3+ builds

Resulting Security Stack

  • Pipeline correctness
  • Artifact provenance
  • Human intent verification

This layered model addresses both:

  • Machine trust
  • Human trust

Strengthening Existing Systems

Sigstore becomes stronger when:

  • Signing is performed from isolated approval terminals
  • Not from potentially compromised developer machines

in-toto becomes stronger when:

  • Workflow steps are gated by explicit human intent

SLSA becomes stronger when:

  • High maturity levels include intent-verification requirements

The Core Problem

Modern frameworks assume:

If the pipeline is correct, the outcome is trustworthy.

This assumption fails when:

  • The pipeline environment is compromised
  • The operator is unaware
  • The system cannot distinguish intent from execution

Conclusion: Frameworks Are Necessary but Insufficient

Sigstore, in-toto, and SLSA dramatically improve supply-chain hygiene.

But hygiene is not intent.

Until human intent is cryptographically bound to high-risk actions, compliant pipelines will continue to ship malicious code under real attacks.

Security architecture must extend beyond machines.

It must include:

The human decision layer — explicitly, verifiably, and securely.

Top comments (0)