Skip to content

Conversation

@TomHennen
Copy link
Contributor

@TomHennen TomHennen commented Dec 3, 2024

The example was in the wrong place. It had been under a threat that was meant for attackers that modified signed attestations, yet it discussed replacing one valid attestation with another.

There wasn't an obivious existing threat to put this under so I created a new one.

fixes #1223

The example was in the wrong place. It had been under a threat
that was meant for attackers that modified signed attestations,
yet it discussed replacing one valid attestation with another.

There wasn't an obivious existing threat to put this under so
I created a new one.

refs slsa-framework#1191

Signed-off-by: Tom Hennen <[email protected]>
@netlify
Copy link

netlify bot commented Dec 3, 2024

Deploy Preview for slsa ready!

Name Link
🔨 Latest commit e00c6c8
🔍 Latest deploy log https://app.netlify.com/sites/slsa/deploys/675226dbacc4880008a1b2a4
😎 Deploy Preview https://deploy-preview-1250--slsa.netlify.app
📱 Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.

To edit notification comments on pull requests, go to your Netlify site configuration.

@TomHennen TomHennen changed the title Moved example to a new threat. content: draft: Moved example to a new threat. Dec 3, 2024
Co-authored-by: Zachariah Cox <[email protected]>
Signed-off-by: Tom Hennen <[email protected]>
@TomHennen TomHennen merged commit 99f9ff3 into slsa-framework:main Dec 5, 2024
5 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

Status: Done

Development

Successfully merging this pull request may close these issues.

Clarify 'Tamper with provenance or VSA' threat

4 participants