-
Notifications
You must be signed in to change notification settings - Fork 233
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Clarify where to use SLSA Provenance vs. VSA #974
Comments
This feels like a good thing to add to the specification soon, i.e. v1.1 |
The |
It is not just when crossing organizational boundaries. In the specification, the SLSA Provenance format is only a recommendation. It might be too generic to just indicate that VSAs can be used when crossing boundaries, but maybe there can be an additional recommendation if the provenance does not conform to the SLSA Provenance format. |
Note that the VSA is also especially useful when you want to do recursive/transitive evaluation of a policy against an artifact (and this is in fact why it was originally developed). Would it be worth noting that as well? CC @AdamZWu |
This concept generalizes to future SLSA tracks as well, so perhaps the phrasing should be about whether the consumer has sufficient context to evaluate an attestation? For example, even if you can see a repo's source code, you may not be able to see the configuration that determines its Source level. In that case, a signed VSA from the source control system or some other trusted party should be sufficient for verifying Source level. |
Absolutely agree, great suggestion. |
In the SLSA specification meeting on 2023-10-02 @MarkLodato suggested to clarify in the specification that:
The text was updated successfully, but these errors were encountered: