Sigstore December Roundup

And lo, in the land of software package management, a system was born to bring order and trust. Sigstore was its name, and its mission was to sign packages with short-lived certificates, validated by a powerful OIDC provider. These signed packages were then placed in a transparency database for all to see, like a holy book open for all to read and verify. Sigstore was a beacon of hope in a chaotic world, shining brightly as a protector of software integrity.

Thanks, Daniel Feldman for generating this (and many other) Sigstore descriptions.

However you describe Sigstore, it’s undeniable that 2022 has been an incredible year for the project and its community. Not only was this the year of the Sigstore GA, but the project had an overwhelming amount of contributors:

  • 450+ Contributing Individuals
  • 70+ Contributing Organizations

New Scientific Paper: “Sigstore: Software Signing For Everybody”

A peer-reviewed research paper called Sigstore: Software Signing for Everybody authored by Zachary Newman, John Speed Meyers, and Santiago Torres-Arias was published at the 2022 ACM Computer and Communications Security (CCS) conference in Los Angeles, CA, an academic computer security conference, featuring publications from research universities around the world and industry labs at organizations like Google, Microsoft, Meta, and Amazon.

📄 Read the paper

When this paper was drafted, 10 months ago, there were 2 million entries in the Rekor log; now there are over 7 million and counting!

New Case Studies

Many companies are adopting Sigstore and are excited to share their story. We published three new Sigstore case studies from Autodesk, DB Schenker, and Verizon since the last roundup!

Using Sigstore to meet FedRAMP Compliance at Autodesk by Jesse Sanford

Securing Your Software Supply Chain Without Changing Your DevOps WorkflowDB Schenker by Tobias Trabelsi

Verizon: Security by Default: How Verizon New Business Incubation Uses Sigstore to Demonstrate Provenance and Improve Customer Confidence by Aaron Bacchi

Sigstore Landscape

The Sigstore Landscape is filled up with projects signed by Sigstore. We want to give a shout-out to the latest additions: FluentBit, Istio, Karpenter, Keptn, Knative, Kubewarden, LinkerD, Pulumi, and Shipwright.

Also a special mention for Sigstore adoptions that aren’t yet on the landscape:

LLVM: Now signs with Sigstore to make it easier for users to verify that the packages came from llvm and to detect potential malicious signatures. Find it on apt repo for Debian/Ubuntu packages.

Updatecli: The latest release is now signed with Sigstore. Read more

Kubernetes release: The recent 1.26 Kubernetes release now signs all software artifacts with Sigstore, not just the container images. Read more

New Content

Our community has been busy with new Sigstore Content including:

New Community Talks

Don’t miss the newest Sigstore community talks including this keynote: What does Sigstore get you as a Kubernetes operator? by Luke Hinds at Kubernetes Community Days UK 2022. View the full Sigstore Community Talk playlist.

Language Client Updates

As many language ecosystems look to adopt Sigstore, work is underway to make it much, much easier. Here’s the latest on language client activity.

Java (sigstore-java)

A common sigstore-java library is being actively developed to be integrated into Java ecosystem tools such as Maven and Gradle. If you’d like to get involved in 2023 or keep up with the latest, please join the Sigstore Java weekly calls.

Javascript (sigstore-js)

The npm community recently accepted the RFC to improve trust of npm packages using Sigstore and trusted build infrastructure. To integrate Sigstore into the npm cli directly, work is underway on a cosign client writing in javascript: sigstore-js. At a recent Sigstore Office Hours Brian de Hamer gave a demo on the latest with sigstore-js.

Python (sigstore-python)

For Python, sigstore-python is working towards its 1.0 release, including work toward stabilizing an importable Python API. sigstore-python 0.9.0 has just been released and becomes the first version to use TUF to automagically establish trust in Sigstore’s public good instances. William Woodruff recently gave a demo of sigstore-python at Sigstore Office Hours. The demo included an overview of new policy support, check out the video.

Rust (sigstore-rs)

Sigstore-rs is a crate for Rust to interact with Sigstore and v0.6.0 just shipped. This release includes a ton of fixes and support for OCI Image signing. Sigstore and memory safety, all in one, what’s not to love?

Latest Releases


Sigstore is currently on version 1.5.0.


Cosign is container signing, verification and storage in an OCI registry.

Its latest release is v2.0.0-rc.0. This is a pre-release for Cosign 2.0! Feel free to try it out, but know there are many breaking changes from 1.0 and the prereleases may continue to change.


Fulcio issues code-signing certificates bound to OpenID Connect identities for use within the Sigstore ecosystem. Its most recent release is v1.0.0.


Keyless Git signing with Sigstore! Its latest release is v0.4.1. Amongst other things, this release features new sub-commands:

gitsign show - Prints out in-toto Statement for the specified commit.
gitsign attest - Stores attestations for a commit / tree in the repository.


Rekor’s aims to provide an immutable tamper-resistant ledger of metadata generated within a software projects supply chain. Its latest release is v1.0.1.

Join the Community

Thank you to all our contributors and users for making 2022 so wonderful!

We take pride in being friendly to everyone, including new folks, and fostering a welcoming and safe environment. There is always room for more people in our community.

Find us on Slack and Twitter @projectsigstore

Think about contributing to Sigstore in 2023!

See you all next year ✨