Zach Steindler (@steiza) 's Twitter Profile
Zach Steindler

@steiza

Hacker, cooker, hiker

ID: 18038422

linkhttps://a2mi.social/web/@steiza calendar_today11-12-2008 02:33:26

260 Tweet

519 Takipçi

386 Takip Edilen

Scott Piper (@0xdabbad00) 's Twitter Profile Photo

New parliament 1.5.0 release. Checks added for: - Single value condition too permissive (confusing IAM detail of ForAllValues), 🙏 patrobinson. See docs.aws.amazon.com/IAM/latest/Use… - Resource effectively *. 🙏 raghavkaul github.com/duo-labs/parli…

GitHub (@github) 's Twitter Profile Photo

We've integrated sigstore support for container image signing into the GitHub Actions starter workflow, so that developers can sign their container images by default. Check out the details! github.blog/2021-12-06-saf…

Zach Steindler (@steiza) 's Twitter Profile Photo

This was a fun collaboration with the GitHub Docs team! Let us know what other security topics you'd like to see guides for.

Zach Steindler (@steiza) 's Twitter Profile Photo

No new emoji flags, based on this post from the Unicode Emoji Subcommittee Chair (which has to be one of the best job titles I've ever heard): blog.unicode.org/2022/03/the-pa… cc 99 Percent Invisible Brady Haran CGP Grey 🐝

GitHub (@github) 's Twitter Profile Photo

Want to use GitHub-hosted Actions runners, but need to access resources on your private network? You’re in luck! We’ve documented 3 ways to do it ⬇️. github.co/3NbDkJE

Zach Steindler (@steiza) 's Twitter Profile Photo

Want to secure your builds, in the cloud, without scattering API keys everywhere? Come see my talk in ~25 minutes: youtube.com/watch?v=YHZdkp… or see my slides after at coffeehousecoders.org/blog/cloud_bui… #fwdcloudsec

sMyle (🦋 @myles.dev) (@mylesborins) 's Twitter Profile Photo

Extremely excited about this. The npm team has been collaborating with GitHub's package security team for months putting together an RFC to improve the audibility and trust of npm packages using SigStore and trusted build infrastructure github.blog/2022-08-08-new…

Clint Gibler (@clintgibler) 's Twitter Profile Photo

✍️ Sigstore project announces general availability and v1.0 releases Two of sigstore foundational projects, Fulcio and Rekor, published v1.0 releases as well Zach Steindler on why GitHub is excited github.blog/2022-10-25-why… By Dave Lester, Bob Callaway opensource.googleblog.com/2022/10/sigsto…

Clint Gibler (@clintgibler) 's Twitter Profile Photo

🗒️ gh-sbom A gh CLI extension that outputs JSON SBOMs (in SPDX or CycloneDX format) for your GitHub repository github.com/advanced-secur…

OpenSSF (@openssf) 's Twitter Profile Photo

Today we're proud to announce the release of version 1.0 of SLSA 🎉 Supply-chain Levels for Software Artifacts is an OpenSSF project that provides specifications for software supply chain security, established by community expert consensus. #OSSecurity

Today we're proud to announce the release of version 1.0 of SLSA 🎉 Supply-chain Levels for Software Artifacts is an OpenSSF project that provides specifications for software supply chain security, established by community expert consensus. #OSSecurity
Zach Steindler (@steiza) 's Twitter Profile Photo

Big day for open source security! npm worked with the open source project Sigstore to put together a beta of provenance, verifiably tying npm packages back to their source code and build instructions: github.blog/2023-04-19-int…

Zach Steindler (@steiza) 's Twitter Profile Photo

Last week was a big one for open source security: - slsa.dev/blog/2023/04/s… - github.blog/2023-04-19-int… - blog.pypi.org/posts/2023-04-… ... and yet, there's so much more to do. I'm excited to serve on the 2023 OpenSSF TAC!

OpenSSF (@openssf) 's Twitter Profile Photo

We Want to Hear from You 🔊👂➡️ Take the OpenSSF Software Security Awareness Survey openssf.org/blog/2023/05/1…

We Want to Hear from You 🔊👂➡️ Take the OpenSSF Software Security Awareness Survey openssf.org/blog/2023/05/1…
Zach Steindler (@steiza) 's Twitter Profile Photo

Looking at push activity is so much better than individual commits. Pushes are authenticated, unlike commit author identity. Looking at pushes you can more easily verify security practices, like requiring reviews (see slsa.dev/spec/v1.0/futu…). Excited to see where this goes!