supply-chain

Dependency vulnerability scanning for Ruby and Node projects

Known vulnerable dependencies are one of the easiest attack paths to close. I scan lockfiles in CI, fail builds on high-severity issues that have fixes, and document exceptions tightly. The goal is not zero alerts at any cost; the goal is fast visibil

Signed release artifacts with cosign for software supply chain trust

Artifact signing gives downstream systems something concrete to verify before deployment. I use cosign because it keeps container and provenance signing practical in CI. Supply chain controls only matter if verification is automated where release deci

Dockerfile hardening for smaller safer containers

Container security starts with the image build. I use small trusted bases, non-root users, explicit file ownership, and multi-stage builds that leave tooling behind. The fewer packages and privileges in the final image, the less there is to exploit.