11/12 free views
Framework
Framework
Supply Chain Security

in-toto

by in-toto

939stars
144forks
36watchers
Updated 8 months ago
About

in-toto is a framework that ensures the integrity of the software supply chain by verifying authorized execution of each step and preventing tampering of the final product.

in-toto is a framework to protect supply chain integrity.

Primary Use Case

in-toto is used by project owners and software supply chain participants to define, enforce, and verify the sequence of steps involved in software production, ensuring that only authorized functionaries perform each task and that artifacts are not tampered with. It is ideal for organizations seeking to secure their build and deployment pipelines against supply chain attacks and maintain compliance.

Key Features
  • Defines a software supply chain layout specifying authorized steps and functionaries
  • Collects and signs metadata (link files) for each supply chain step executed
  • Verifies the integrity and authenticity of the final product using layout and link signatures
  • Supports artifact rules to authorize and enforce allowed file operations per step
  • Enables manual or automated verification of supply chain integrity
  • Allows inclusion of inspections to run commands during verification
  • Provides a simple rule language to chain and enforce artifact transformations

Installation

  • Ensure system dependencies are met as per documentation
  • Install in-toto via pip: pip install in-toto
  • Refer to https://in-toto.readthedocs.io/en/latest/installing.html for alternative installation methods and recommendations

Usage

>_ pip install in-toto

Installs the in-toto framework via Python package manager pip

Security Frameworks
Defense Evasion
Credential Access
Impact
Initial Access
Persistence
Usage Insights
  • Integrate in-toto with CI/CD pipelines to automate supply chain integrity verification at every build and deployment stage.
  • Leverage in-toto metadata to enhance anomaly detection by correlating build step deviations with runtime alerts.
  • Use in-toto layouts to enforce strict role-based access and authorization policies for build and deployment functionaries.
  • Combine in-toto with software bill of materials (SBOM) tools to improve transparency and traceability of software components.
  • Employ in-toto inspections to run custom security checks and compliance audits automatically during supply chain verification.

Docs Take 2 Hours. AI Takes 10 Seconds.

Ask anything about in-toto. Installation? Config? Troubleshooting? Get answers trained on real docs and GitHub issues—not generic ChatGPT fluff.

This tool hasn't been indexed yet. Request indexing to enable AI chat.

Admin will review your request within 24 hours

Security Profile
Red Team70%
Blue Team60%
Purple Team70%
Details
LicenseOther
LanguagePython
Open Issues174
Topics
supply-chain
security
new-york-university
secure-systems-lab