Close Menu
geekfence.comgeekfence.com
    What's Hot

    Buying a phone in 2026? Follow this one rule

    February 10, 2026

    3 Questions: Using AI to help Olympic skaters land a quint | MIT News

    February 10, 2026

    Introducing the new Databricks Partner Program and Well-Architected Framework for ISVs and Data Providers

    February 10, 2026
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    Facebook Instagram
    geekfence.comgeekfence.com
    • Home
    • UK Tech News
    • AI
    • Big Data
    • Cyber Security
      • Cloud Computing
      • iOS Development
    • IoT
    • Mobile
    • Software
      • Software Development
      • Software Engineering
    • Technology
      • Green Technology
      • Nanotechnology
    • Telecom
    geekfence.comgeekfence.com
    Home»Cyber Security»Open Source, Rebuilt to Last
    Cyber Security

    Open Source, Rebuilt to Last

    AdminBy AdminFebruary 7, 2026No Comments5 Mins Read5 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    Open Source, Rebuilt to Last
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Today we’re excited to announce OSS Rebuild, a new project to strengthen trust in open source package ecosystems by reproducing upstream artifacts. As supply chain attacks continue to target widely-used dependencies, OSS Rebuild gives security teams powerful data to avoid compromise without burden on upstream maintainers.

    The project comprises:

    • Automation to derive declarative build definitions for existing PyPI (Python), npm (JS/TS), and Crates.io (Rust) packages.

    • SLSA Provenance for thousands of packages across our supported ecosystems, meeting SLSA Build Level 3 requirements with no publisher intervention.

    • Build observability and verification tools that security teams can integrate into their existing vulnerability management workflows.

    • Infrastructure definitions to allow organizations to easily run their own instances of OSS Rebuild to rebuild, generate, sign, and distribute provenance.

    Challenges

    Open source software has become the foundation of our digital world. From critical infrastructure to everyday applications, OSS components now account for 77% of modern applications. With an estimated value exceeding $12 trillion, open source software has never been more integral to the global economy.

    Yet this very ubiquity makes open source an attractive target: Recent high-profile supply chain attacks have demonstrated sophisticated methods for compromising widely-used packages. Each incident erodes trust in open ecosystems, creating hesitation among both contributors and consumers.

    The security community has responded with initiatives like OpenSSF Scorecard, pypi’s Trusted Publishers, and npm’s native SLSA support. However, there is no panacea: Each effort targets a certain aspect of the problem, often making tradeoffs like shifting work onto publishers and maintainers.

    Our Aim

    Our aim with OSS Rebuild is to empower the security community to deeply understand and control their supply chains by making package consumption as transparent as using a source repository. Our rebuild platform unlocks this transparency by utilizing a declarative build process, build instrumentation, and network monitoring capabilities which, within the SLSA Build framework, produces fine-grained, durable, trustworthy security metadata.

    Building on the hosted infrastructure model that we pioneered with OSS Fuzz for memory issue detection, OSS Rebuild similarly seeks to use hosted resources to address security challenges in open source, this time aimed at securing the software supply chain.

    Our vision extends beyond any single ecosystem: We are committed to bringing supply chain transparency and security to all open source software development. Our initial support for the PyPI (Python), npm (JS/TS), and Crates.io (Rust) package registries—providing rebuild provenance for many of their most popular packages—is just the beginning of our journey.

    How OSS Rebuild Works

    Through automation and heuristics, we determine a prospective build definition for a target package and rebuild it. We semantically compare the result with the existing upstream artifact, normalizing each one to remove instabilities that cause bit-for-bit comparisons to fail (e.g. archive compression). Once we reproduce the package, we publish the build definition and outcome via SLSA Provenance. This attestation allows consumers to reliably verify a package’s origin within the source history, understand and repeat its build process, and customize the build from a known-functional baseline (or maybe even use it to generate more detailed SBOMs).

    With OSS Rebuild’s existing automation for PyPI, npm, and Crates.io, most packages obtain protection effortlessly without user or maintainer intervention. Where automation isn’t currently able to fully reproduce the package, we offer manual build specification so the whole community benefits from individual contributions.

    And we are also excited at the potential for AI to help reproduce packages: Build and release processes are often described in natural language documentation which, while difficult to utilize with discrete logic, is increasingly useful to language models. Our initial experiments have demonstrated the approach’s viability in automating exploration and testing, with limited human intervention, even in the most complex builds.

    Our Capabilities

    OSS Rebuild helps detect several classes of supply chain compromise:

    • Unsubmitted Source Code – When published packages contain code not present in the public source repository, OSS Rebuild will not attest to the artifact.

    • Build Environment Compromise – By creating standardized, minimal build environments with comprehensive monitoring, OSS Rebuild can detect suspicious build activity or avoid exposure to compromised components altogether.

    • Stealthy Backdoors – Even sophisticated backdoors like xz often exhibit anomalous behavioral patterns during builds. OSS Rebuild’s dynamic analysis capabilities can detect unusual execution paths or suspicious operations that are otherwise impractical to identify through manual review.

    For enterprises and security professionals, OSS Rebuild can…

    • Enhance metadata without changing registries by enriching data for upstream packages. No need to maintain custom registries or migrate to a new package ecosystem.

    • Augment SBOMs by adding detailed build observability information to existing Software Bills of Materials, creating a more complete security picture.

    • Accelerate vulnerability response by providing a path to vendor, patch, and re-host upstream packages using our verifiable build definitions.

    For publishers and maintainers of open source packages, OSS Rebuild can…

    • Strengthen package trust by providing consumers with independent verification of the packages’ build integrity, regardless of the sophistication of the original build.

    • Retrofit historical packages’ integrity with high-quality build attestations, regardless of whether build attestations were present or supported at the time of publication.

    • Reduce CI security-sensitivity allowing publishers to focus on core development work. CI platforms tend to have complex authorization and execution models and by performing separate rebuilds, the CI environment no longer needs to be load-bearing for your packages’ security.

    Check it out!

    The easiest (but not only!) way to access OSS Rebuild attestations is to use the provided Go-based command-line interface. It can be compiled and installed easily:

    $ go install github.com/google/oss-rebuild/cmd/oss-rebuild@latest

    You can fetch OSS Rebuild’s SLSA Provenance:

    $ oss-rebuild get cratesio syn 2.0.39

    ..or explore the rebuilt versions of a particular package:

    $ oss-rebuild list pypi absl-py

    ..or even rebuild the package for yourself:

    $ oss-rebuild get npm lodash 4.17.20 –output=dockerfile | \

       docker run $(docker buildx build -q -)

    Join Us in Helping Secure Open Source

    OSS Rebuild is not just about fixing problems; it’s about empowering end-users to make open source ecosystems more secure and transparent through collective action. If you’re a developer, enterprise, or security researcher interested in OSS security, we invite you to follow along and get involved!



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    Here’s what you should know

    February 10, 2026

    Improving SOC efficiency with automation

    February 9, 2026

    Fake Dubai Crown Prince tracked to Nigerian mansion after $2.5M romance scam

    February 8, 2026

    Man pleads guilty to hacking nearly 600 women’s Snapchat accounts

    February 6, 2026

    The Buyer’s Guide to AI Usage Control

    February 5, 2026

    Please Don’t Feed the Scattered Lapsus ShinyHunters – Krebs on Security

    February 4, 2026
    Top Posts

    Hard-braking events as indicators of road segment crash risk

    January 14, 202617 Views

    Understanding U-Net Architecture in Deep Learning

    November 25, 202512 Views

    Achieving superior intent extraction through decomposition

    January 25, 20268 Views
    Don't Miss

    Buying a phone in 2026? Follow this one rule

    February 10, 2026

    Summary created by Smart Answers AIIn summary:Tech Advisor advises following the ‘previous generation rule’ when…

    3 Questions: Using AI to help Olympic skaters land a quint | MIT News

    February 10, 2026

    Introducing the new Databricks Partner Program and Well-Architected Framework for ISVs and Data Providers

    February 10, 2026

    Threat Observability Updates in Secure Firewall 10.0

    February 10, 2026
    Stay In Touch
    • Facebook
    • Instagram
    About Us

    At GeekFence, we are a team of tech-enthusiasts, industry watchers and content creators who believe that technology isn’t just about gadgets—it’s about how innovation transforms our lives, work and society. We’ve come together to build a place where readers, thinkers and industry insiders can converge to explore what’s next in tech.

    Our Picks

    Buying a phone in 2026? Follow this one rule

    February 10, 2026

    3 Questions: Using AI to help Olympic skaters land a quint | MIT News

    February 10, 2026

    Subscribe to Updates

    Please enable JavaScript in your browser to complete this form.
    Loading
    • About Us
    • Contact Us
    • Disclaimer
    • Privacy Policy
    • Terms and Conditions
    © 2026 Geekfence.All Rigt Reserved.

    Type above and press Enter to search. Press Esc to cancel.