Close Menu
geekfence.comgeekfence.com
    What's Hot

    Mara Blue Launches Feasibility Study for Ireland’s First Marine Biorefinery in Castletownbere

    March 4, 2026

    Charter and AMC Networks to host SCTE TechExpo 2026

    March 4, 2026

    How AI trained on birds is surfacing underwater mysteries

    March 4, 2026
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    Facebook Instagram
    geekfence.comgeekfence.com
    • Home
    • UK Tech News
    • AI
    • Big Data
    • Cyber Security
      • Cloud Computing
      • iOS Development
    • IoT
    • Mobile
    • Software
      • Software Development
      • Software Engineering
    • Technology
      • Green Technology
      • Nanotechnology
    • Telecom
    geekfence.comgeekfence.com
    Home»Cyber Security»Open Source, Rebuilt to Last
    Cyber Security

    Open Source, Rebuilt to Last

    AdminBy AdminFebruary 7, 2026No Comments5 Mins Read5 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    Open Source, Rebuilt to Last
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Today we’re excited to announce OSS Rebuild, a new project to strengthen trust in open source package ecosystems by reproducing upstream artifacts. As supply chain attacks continue to target widely-used dependencies, OSS Rebuild gives security teams powerful data to avoid compromise without burden on upstream maintainers.

    The project comprises:

    • Automation to derive declarative build definitions for existing PyPI (Python), npm (JS/TS), and Crates.io (Rust) packages.

    • SLSA Provenance for thousands of packages across our supported ecosystems, meeting SLSA Build Level 3 requirements with no publisher intervention.

    • Build observability and verification tools that security teams can integrate into their existing vulnerability management workflows.

    • Infrastructure definitions to allow organizations to easily run their own instances of OSS Rebuild to rebuild, generate, sign, and distribute provenance.

    Challenges

    Open source software has become the foundation of our digital world. From critical infrastructure to everyday applications, OSS components now account for 77% of modern applications. With an estimated value exceeding $12 trillion, open source software has never been more integral to the global economy.

    Yet this very ubiquity makes open source an attractive target: Recent high-profile supply chain attacks have demonstrated sophisticated methods for compromising widely-used packages. Each incident erodes trust in open ecosystems, creating hesitation among both contributors and consumers.

    The security community has responded with initiatives like OpenSSF Scorecard, pypi’s Trusted Publishers, and npm’s native SLSA support. However, there is no panacea: Each effort targets a certain aspect of the problem, often making tradeoffs like shifting work onto publishers and maintainers.

    Our Aim

    Our aim with OSS Rebuild is to empower the security community to deeply understand and control their supply chains by making package consumption as transparent as using a source repository. Our rebuild platform unlocks this transparency by utilizing a declarative build process, build instrumentation, and network monitoring capabilities which, within the SLSA Build framework, produces fine-grained, durable, trustworthy security metadata.

    Building on the hosted infrastructure model that we pioneered with OSS Fuzz for memory issue detection, OSS Rebuild similarly seeks to use hosted resources to address security challenges in open source, this time aimed at securing the software supply chain.

    Our vision extends beyond any single ecosystem: We are committed to bringing supply chain transparency and security to all open source software development. Our initial support for the PyPI (Python), npm (JS/TS), and Crates.io (Rust) package registries—providing rebuild provenance for many of their most popular packages—is just the beginning of our journey.

    How OSS Rebuild Works

    Through automation and heuristics, we determine a prospective build definition for a target package and rebuild it. We semantically compare the result with the existing upstream artifact, normalizing each one to remove instabilities that cause bit-for-bit comparisons to fail (e.g. archive compression). Once we reproduce the package, we publish the build definition and outcome via SLSA Provenance. This attestation allows consumers to reliably verify a package’s origin within the source history, understand and repeat its build process, and customize the build from a known-functional baseline (or maybe even use it to generate more detailed SBOMs).

    With OSS Rebuild’s existing automation for PyPI, npm, and Crates.io, most packages obtain protection effortlessly without user or maintainer intervention. Where automation isn’t currently able to fully reproduce the package, we offer manual build specification so the whole community benefits from individual contributions.

    And we are also excited at the potential for AI to help reproduce packages: Build and release processes are often described in natural language documentation which, while difficult to utilize with discrete logic, is increasingly useful to language models. Our initial experiments have demonstrated the approach’s viability in automating exploration and testing, with limited human intervention, even in the most complex builds.

    Our Capabilities

    OSS Rebuild helps detect several classes of supply chain compromise:

    • Unsubmitted Source Code – When published packages contain code not present in the public source repository, OSS Rebuild will not attest to the artifact.

    • Build Environment Compromise – By creating standardized, minimal build environments with comprehensive monitoring, OSS Rebuild can detect suspicious build activity or avoid exposure to compromised components altogether.

    • Stealthy Backdoors – Even sophisticated backdoors like xz often exhibit anomalous behavioral patterns during builds. OSS Rebuild’s dynamic analysis capabilities can detect unusual execution paths or suspicious operations that are otherwise impractical to identify through manual review.

    For enterprises and security professionals, OSS Rebuild can…

    • Enhance metadata without changing registries by enriching data for upstream packages. No need to maintain custom registries or migrate to a new package ecosystem.

    • Augment SBOMs by adding detailed build observability information to existing Software Bills of Materials, creating a more complete security picture.

    • Accelerate vulnerability response by providing a path to vendor, patch, and re-host upstream packages using our verifiable build definitions.

    For publishers and maintainers of open source packages, OSS Rebuild can…

    • Strengthen package trust by providing consumers with independent verification of the packages’ build integrity, regardless of the sophistication of the original build.

    • Retrofit historical packages’ integrity with high-quality build attestations, regardless of whether build attestations were present or supported at the time of publication.

    • Reduce CI security-sensitivity allowing publishers to focus on core development work. CI platforms tend to have complex authorization and execution models and by performing separate rebuilds, the CI environment no longer needs to be load-bearing for your packages’ security.

    Check it out!

    The easiest (but not only!) way to access OSS Rebuild attestations is to use the provided Go-based command-line interface. It can be compiled and installed easily:

    $ go install github.com/google/oss-rebuild/cmd/oss-rebuild@latest

    You can fetch OSS Rebuild’s SLSA Provenance:

    $ oss-rebuild get cratesio syn 2.0.39

    ..or explore the rebuilt versions of a particular package:

    $ oss-rebuild list pypi absl-py

    ..or even rebuild the package for yourself:

    $ oss-rebuild get npm lodash 4.17.20 –output=dockerfile | \

       docker run $(docker buildx build -q -)

    Join Us in Helping Secure Open Source

    OSS Rebuild is not just about fixing problems; it’s about empowering end-users to make open source ecosystems more secure and transparent through collective action. If you’re a developer, enterprise, or security researcher interested in OSS security, we invite you to follow along and get involved!



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    They seized $4.8m in crypto… then gave the master key to the internet

    March 4, 2026

    Cultivating a robust and efficient quantum-safe HTTPS

    March 3, 2026

    Anthropic confirms Claude is down in a worldwide outage

    March 2, 2026

    ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket

    March 1, 2026

    Who is the Kimwolf Botmaster “Dort”? – Krebs on Security

    February 28, 2026

    How to tell if a voice call is AI or not

    February 27, 2026
    Top Posts

    Hard-braking events as indicators of road segment crash risk

    January 14, 202619 Views

    Understanding U-Net Architecture in Deep Learning

    November 25, 202518 Views

    How to integrate a graph database into your RAG pipeline

    February 8, 202610 Views
    Don't Miss

    Mara Blue Launches Feasibility Study for Ireland’s First Marine Biorefinery in Castletownbere

    March 4, 2026

    A feasibility study to explore the potential for Ireland’s first full-scale marine biorefinery has been officially launched by the Mara…

    Charter and AMC Networks to host SCTE TechExpo 2026

    March 4, 2026

    How AI trained on birds is surfacing underwater mysteries

    March 4, 2026

    Azure Databricks Lakebase is Generally Available

    March 4, 2026
    Stay In Touch
    • Facebook
    • Instagram
    About Us

    At GeekFence, we are a team of tech-enthusiasts, industry watchers and content creators who believe that technology isn’t just about gadgets—it’s about how innovation transforms our lives, work and society. We’ve come together to build a place where readers, thinkers and industry insiders can converge to explore what’s next in tech.

    Our Picks

    Mara Blue Launches Feasibility Study for Ireland’s First Marine Biorefinery in Castletownbere

    March 4, 2026

    Charter and AMC Networks to host SCTE TechExpo 2026

    March 4, 2026

    Subscribe to Updates

    Please enable JavaScript in your browser to complete this form.
    Loading
    • About Us
    • Contact Us
    • Disclaimer
    • Privacy Policy
    • Terms and Conditions
    © 2026 Geekfence.All Rigt Reserved.

    Type above and press Enter to search. Press Esc to cancel.