Join us

ContentUpdates and recent posts about Sigstore..
Story Trending
@dwisiswant0 shared a post, 1 week, 4 days ago

The most practical, fast, tiny command sandboxing for AI agents

Need to run one sketchy command without a full container? Here is the most practical, lightweight way to lock down one risky command in your AI pipeline. No daemon, no root, no image build.

sandboxec-social-preview
Story Trending
@laura_garcia shared a post, 1 week, 4 days ago
Software Developer, RELIANOID

🚀 Deploy RELIANOID Community Edition v7 on Microsoft Azure using Terraform.

⚡ Infrastructure ready in minutes ⚡ Official Terraform module ⚡ Fully automated Azure deployment Simple. Fast. Reproducible. #Terraform#Azure#DevOps#IaC#LoadBalancer#CloudInfrastructure#RELIANOID https://www.relianoid.com/resources/knowledge-base/community-edition-v7-administration-guide/deploy-reli..

terraform_relianoid_community_azure_img2
Story Trending
@laura_garcia shared a post, 1 week, 5 days ago
Software Developer, RELIANOID

🚀 See you at DeveloperWeek — February 18–20, 2026!

🚀 See you at DeveloperWeek — February 18–20, 2026! The world’s largest independent software development & AI engineering conference lands in San Jose, bringing together developers, architects, and tech leaders shaping the future of software. From AI & cloud-native to DevSecOps and developer experien..

developer-week-san-jose-california-2026
News FAUN.dev() Team Trending
@kala shared an update, 1 week, 6 days ago
FAUN.dev()

OpenAI Hires OpenClaw Creator Peter Steinberger; Project Moves to Independent Foundation

OpenClaw

Peter Steinberger, creator of OpenClaw, is joining OpenAI to work on bringing AI agents to a broader audience, while OpenClaw will move to an independent open-source foundation and continue development outside OpenAI’s direct control.

OpenAI Hires OpenClaw Creator Peter Steinberger; Project Moves to Independent Foundation
 Activity
@juliocalves started using tool Terraform , 2 weeks ago.
 Activity
@juliocalves started using tool Kubernetes , 2 weeks ago.
 Activity
@juliocalves started using tool Kubectl , 2 weeks ago.
 Activity
@juliocalves started using tool Grafana , 2 weeks ago.
 Activity
@juliocalves started using tool Amazon ECS , 2 weeks ago.
 Activity
@juliocalves started using tool Amazon CloudWatch , 2 weeks ago.
Sigstore is an open source initiative designed to make software artifact signing and verification simple, automatic, and widely accessible. Its primary goal is to improve software supply chain security by enabling developers and organizations to cryptographically prove the origin and integrity of the software they build and distribute.

At its core, sigstore removes many of the traditional barriers associated with code signing. Instead of managing long-lived private keys manually, sigstore supports keyless signing, where identities are issued dynamically using OpenID Connect (OIDC) providers such as GitHub Actions, Google, or Microsoft. This dramatically lowers operational complexity and reduces the risk of key compromise.

The sigstore ecosystem is composed of several key components:

- Cosign: A tool for signing, verifying, and storing signatures for container images and other artifacts. Signatures are stored alongside artifacts in OCI registries, rather than embedded in them.

- Fulcio: A certificate authority that issues short-lived X.509 certificates based on OIDC identities, enabling keyless signing.

- Rekor: A transparency log that records signing events in an append-only, tamper-evident ledger. This provides public auditability and detection of suspicious or malicious signing activity.

Together, these components allow anyone to verify who built an artifact, when it was built, and whether it has been tampered with, using publicly verifiable cryptographic proofs. This aligns closely with modern supply chain security practices such as SLSA (Supply-chain Levels for Software Artifacts).

sigstore is widely adopted in the cloud-native ecosystem and integrates with tools like Kubernetes, container registries, CI/CD pipelines, and package managers. It is commonly used to sign container images, Helm charts, binaries, and SBOMs, and is increasingly becoming a baseline security requirement for production software delivery.

The project is governed by the OpenSSF (Open Source Security Foundation) and supported by major industry players.