THE LINUX FOUNDATION PROJECTS
Blog

Alpha-Omega Grant To Help Homebrew Reach SLSA Build Level 2

Alpha-Omega is pleased to announce a grant to the Homebrew project to enable Sigstore attestations and verification of Homebrew packages. When complete the project will allow organizations to securely verify the provenance of the toolchains on their workstations and in their build environments. This is a critical part of securing every software supply chain. 

Alpha-Omega is an associated project of the OpenSSF, funded by Microsoft, Google, and Amazon, and with a mission to protect society by catalyzing sustainable security improvements to the most critical open source software projects and ecosystems. “Alpha-Omega is turning money into security,” said Michael Scovetta, Principal Security PM Manager at Microsoft. “With over $5M granted so far, Alpha-Omega has catalyzed security improvements across the open source ecosystem.”

Homebrew is the predominant package manager for macOS, with millions of daily users and hundreds of active contributors. Homebrew is also widely used on Linux and preinstalled on GitHub Actions’ hosted runners. Homebrew successfully delivers over 500 million binary builds of open-source packages to users each year.

The goal of this project is to make the signing and verification of Homebrew packages (called bottles) boring and easy. “Package managers like Homebrew are the app stores of software development and have become critical points of leverage in securing our software supply chains”, said Michael Winser, Technical Strategist at Alpha-Omega. Although Homebrew already signs commits with GPG, this doesn’t go far enough, as there’s no way for the Homebrew client or users to detect compromised bottles. 

This is where Sigstore and SLSA come in. Sigstore makes the hard problems of key and identity management and verification much easier for producers and consumers alike. SLSA is a specification for describing and incrementally improving supply chain security. With this project, every single bottle provided by homebrew-core will be digitally signed in a manner that proves that it was built on Homebrew’s trusted CI/CD. In other words, SLSA Build Level 2.

This work will be done as open source in the Homebrew project by Trail of Bits in collaboration with the Homebrew community. We encourage you to read their post that goes into more technical detail about the challenges of signing, what SLSA Build Level 2 entails, and how Sigstore makes it practical. 

Alpha-Omega grants are driving high-leverage improvements in security across the open source ecosystem. We’re always interested in new projects and opportunities where we can help. You can learn more on our grants page or by attending one of our monthly public meetings.

Other posts to check out

Weekend at Bernie’s: Which of your dependencies are wearing sunglasses

| Blog | No Comments
By Andrew Nesbitt In the 1989 film, two junior employees turn up at their boss's beach house to find him dead, and spend the rest of the weekend wheeling him around…

Scaling Ruby’s defenses with AI

| Blog | No Comments
This blog post was originally published on the Ruby Gems Blog by Colby Swandale, Technical lead at RubyCentral. On April 23rd, we submitted a vulnerability report to the Nokogiri maintainers. It was the first…

The Python Package Index has Completed its Second Audit

| Blog | No Comments
This blog post was originally published to the Python Package Index blog by Mike Fiedler, the PyPI Safety & Security Engineer. In 2023 PyPI completed its first security audit, and…

Hex.pm Security Audit: Results and Next Steps

| Blog | No Comments
This blog was originally published on the hex.pm blog by Eric Meadows-Jönsson and Jonatan Männchen Over the past months, we conducted the first comprehensive third-party security audit of Hex.pm and its…