More Software Engineering Radio episodes

Dan Lorenc on Sigstore thumbnail

Dan Lorenc on Sigstore

Published 18 Mar 2026

Duration: 39:04

Software supply chain attacks exploit vulnerabilities in development tools and open-source components, exemplified by the Shyhalood NPM breach, with SIGStore proposed as a cryptographic solution to verify software integrity, though challenges like enforcement and privacy persist in securing open-source ecosystems.

Episode Description

Dan Lorenc, co-founder and CEO of Chainguard, joins host Priyanka Raghavan to explore Sigstore and its role in securing the software supply chain. The...

Overview

Software supply chain attacks exploit vulnerabilities in the tools, libraries, and components used to build software, enabling malicious code injection into final products. These attacks target open-source components, third-party tools, and build systems, creating complex vulnerabilities across global ecosystems. As open-source adoption expands into critical systems, the attack surface has grown, prompting attackers to focus on supply chain weaknesses rather than direct system infiltration. A notable example is the Shyhalood attack, where a self-replicating worm compromised the NPM registry by stealing maintainers credentials, spreading malware to over 500 repositories and underscoring risks in credential theft and unsecured package distribution. While NPM eventually contained the attack, similar incidents highlight the persistent threat of supply chain exploitation, with potential for severe outcomes like ransomware or data theft.

SIGStore is presented as a critical solution to secure software supply chains by verifying the integrity of components through cryptographic signatures and transparency logs, ensuring software authenticity. Designed to address vulnerabilities like unauthorized code injection and credential theft, SIGStore links source code, builds, and packages using tamper-proof seals tied to trusted identities, such as email addresses or build systems. Unlike traditional methods like PGP, SIGStore scales for open-source ecosystems, automating signing and verification processes to reduce key management burdens. Its integration with tools like OpenID Connect and transparency logs allows organizations to audit signed components and detect malicious activity, such as unauthorized signatures or compromised emails. However, its effectiveness relies on widespread adoption and enforcement of verification policies, as signing alone does not prevent malicious code introduction during development or distribution.

Broader industry implications emphasize the necessity of securing open-source software, which is now embedded in critical infrastructure. The "weakest link" paradigm in supply chains means even a single vulnerability can compromise entire systems, necessitating comprehensive strategies. Tools like SIGStore aim to standardize verification practices, similar to how Lets Encrypt revolutionized HTTPS adoption. However, challenges remain, including balancing transparency with privacy, cultural shifts toward verification enforcement, and mitigating risks like typo-squatting or compromised identities. Additionally, while SIGStore ensures code origin and integrity, it does not address the contents maliciousness, requiring complementary policies and risk profiling. The evolution toward trust-based systems, leveraging transparency logs and identity verification, underscores the industrys shift toward securing supply chains as a foundational priority.

Recent Episodes of Software Engineering Radio

13 May 2026 SE Radio 720: Martin Dilger on Understanding Eventsourcing

Recommended: Useful Architectural Pattern.

Event sourcing is a system design approach that records changes as sequential events to ensure historical traceability, uses event modeling for aligning systems with human workflows, contrasts with CRUD architectures, and emphasizes slice-based design, event streams, and practical applications like legacy modernization and workflow simplification.

6 May 2026 Birol Yildiz on Building an Agentic AI SRE

AI agents in SRE leverage autonomous decision-making, agentic search, and lightweight architectures to replace static runbooks, balancing autonomy with reliability challenges, context management, and human oversight in dynamic environments.

29 Apr 2026 Will Sentance on JS Modernization

JavaScript's evolution from a 1995 scripting language to a performance-optimized modern tool balances innovation with backward compatibility through TC39's incremental updates, browser advancements, community-driven libraries, key features like async/await and symbols, engine optimizations, and a design philosophy prioritizing flexibility and user-driven standardization for large-scale frameworks.

23 Apr 2026 Eric Tschetter on Decoupling Observability

Recommended: Telemetry is important, avoiding vendor lockin is even more important.

Observability in microservices emphasizes decoupled architectures over traditional frameworks to address vendor lock-in, data interoperability, and scalability challenges, while balancing unstructured telemetry management, query language standardization, and cross-team collaboration.

15 Apr 2026 Martin Kleppmann Local-First Software

Local First Software combines local data storage with cloud collaboration to enable offline access, real-time editing, and seamless syncing via AutoMerge and CRDTs, prioritizing user control, privacy, and decentralized workflows with future focus on open standards and AI integration.

More Software Engineering Radio episodes