You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* Publish threat model in documentation
* Separate security contents a bit more, update link to threat model, update nav
* Add a section on supply chain and SBOM/SLSA mitigation
* Update threat model with feedback from David Hadas
* Update introduction with content from davidhadas, add sections on controller and webhook functionality and update targets of threats
Our signing identity(Subject) for our releases is `[email protected]` and the Issuer is `https://accounts.google.com`
50
-
51
-
### Apple macOS
52
-
53
-
In addition to signing our binaries with `cosign`, we [notarize](https://developer.apple.com/documentation/security/notarizing_macos_software_before_distribution) our macOS binaries. You can use the `codesign` utility to verify our binaries from 1.9 release. You should expect an output that looks
54
-
like this. The expected TeamIdentifier is `7R64489VHL`
Authority=Developer ID Application: Mahamed Ali (7R64489VHL)
63
-
Authority=Developer ID Certification Authority
64
-
Authority=Apple Root CA
65
-
Timestamp=3 Oct 2022 at 22:50:07
66
-
...
67
-
TeamIdentifier=7R64489VHL
68
-
```
69
-
70
14
## Report a vulnerability
71
15
72
16
We're extremely grateful for security researchers and users that report vulnerabilities to the Knative Open Source Community. All reports are thoroughly investigated by a set of community volunteers.
0 commit comments