<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[Stories by ralphbean on Medium]]></title>
        <description><![CDATA[Stories by ralphbean on Medium]]></description>
        <link>https://medium.com/@rbean_3467?source=rss-d5309496f692------2</link>
        <image>
            <url>https://cdn-images-1.medium.com/fit/c/150/150/0*n5inBPxg3ilX-k_A</url>
            <title>Stories by ralphbean on Medium</title>
            <link>https://medium.com/@rbean_3467?source=rss-d5309496f692------2</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Sat, 23 May 2026 16:23:36 GMT</lastBuildDate>
        <atom:link href="https://medium.com/@rbean_3467/feed" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[What Even Is the Harness?]]></title>
            <link>https://medium.com/@rbean_3467/what-even-is-the-harness-f21336768a80?source=rss-d5309496f692------2</link>
            <guid isPermaLink="false">https://medium.com/p/f21336768a80</guid>
            <category><![CDATA[supply-chain-security]]></category>
            <category><![CDATA[harness-engineering]]></category>
            <category><![CDATA[ai-agent]]></category>
            <category><![CDATA[ai-agent-software]]></category>
            <dc:creator><![CDATA[ralphbean]]></dc:creator>
            <pubDate>Mon, 06 Apr 2026 12:11:01 GMT</pubDate>
            <atom:updated>2026-04-06T12:11:01.341Z</atom:updated>
            <content:encoded><![CDATA[<p>I got an email from Anthropic the other day with a promotional credit (I bet you got it too). But near the end, I saw this:</p><blockquote><em>“One note: as of April 4, third-party harnesses like OpenClaw connected to your Claude account now draw from extra usage instead of from your subscription.”</em></blockquote><p>They called <a href="https://openclaw.ai/">OpenClaw</a> a harness. I thought: <em>“That’s wrong. OpenClaw isn’t a harness. It’s an agent runtime — it drives the agent loop.”</em></p><p>What does the word harness even mean?</p><p>In February 2026, three posts sparked the conversation around “harness engineering.” <a href="https://mitchellh.com/writing/my-ai-adoption-journey#step-5-engineer-the-harness">Mitchell Hashimoto wrote about it</a> as a step in his AI adoption journey. His core insight: “anytime you find an agent makes a mistake, you take the time to engineer a solution such that the agent never makes that mistake again.” He described two forms — a well-maintained AGENTS.md where each line traces back to a bad agent behavior, and actual programmed tools like scripts for screenshots and filtered test runs. <a href="https://openai.com/index/harness-engineering/">OpenAI wrote about applying the idea internally</a> to ship an app with no human code review. <a href="https://martinfowler.com/articles/exploring-gen-ai/harness-engineering-memo.html">Birgitta Böckeler published a summary memo</a> on Martin Fowler’s site.</p><p>Birgitta Böckeler just published <a href="https://martinfowler.com/articles/harness-engineering.html">an expanded article</a> a few days ago that gives the concept a more rigorous framing. It’s really great. Give it a read. She defines the harness as “everything in an AI agent except the model itself” — <em>Agent = Model + Harness</em> — and decomposes it into <strong>guides</strong> (feedforward controls that steer before action) and <strong>sensors</strong> (feedback controls that enable self-correction). She also drew a useful line in a diagram near the top between the <strong>builder harness</strong> or <strong>inner harness </strong>(what ships with the tool; I think I’d rather call this the “agent runtime”) and the <strong>user harness</strong> (what you add, specific to your app and context; what I think Mitchell Hashimoto would call the harness).</p><h2>Five layers, outside in</h2><p>There’s more to an agent than <em>Model + Harness</em>. For me, this starts with the observation that we just can’t trust the agent runtime. In order to get some certainty about the <a href="https://medium.com/@rbean_3467/supply-chain-security-meets-the-agentic-factory-5a770c34369b">supply chain security</a> of code produced by an agent factory, we need a distinct sandbox layer that we can use to capture provenance information and limit the blast radius of an agent off the rails.</p><p>I think of it as a matryoshka doll, outside-in:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*npPUoEIUlKtJGaS2G-CbPg.png" /><figcaption>Infrastructure → Sandbox → Harness → Runtime → Model</figcaption></figure><p><strong>Infrastructure</strong> — where agents physically run. Could be GitHub Actions runners, Kubernetes pods, VMs. This layer is about compute, networking, and resource management.</p><p><strong>Sandbox</strong> — constrains what the agent <em>can</em> do and limits blast radius. My colleague <a href="https://www.linkedin.com/in/maruiz93/">Marta Anon Ruiz</a> described this layer as “shaping the intentionality of the agent.” Projects like NVIDIA’s <a href="https://github.com/NVIDIA/OpenShell">OpenShell</a> operate here. From a supply chain security perspective, this is your primary trust boundary — the difference between an agent that can rm -rf / and one that can&#39;t - the difference between an agent that can gh issue delete all of your github issues and one that can&#39;t (or, one that can write and execute its own script to do the same).</p><p><strong>Harness </strong>— the enablement layer. AGENTS.md files, skills, custom tools, hand-crafted linters, system prompts for task-oriented agents. These are the things you engineer, iteratively, to increase the chances the agent gets things right. This is what Birgitta Böckeler calls the user harness and is where Mitchell Hashimoto’s attention lives.</p><p><strong>Agent runtime</strong> — the engine driving the agent loop. Claude Code, opencode, goose, or something custom-built. It handles tool dispatch, context windows, conversation management. This is where OpenClaw lives — it’s a runtime, not a harness. Birgitta Böckeler calls this part of the harness — I think it’s better to call it something else. “Agent runtime” makes sense to me. At this point, I don’t think it’s valuable anymore to build your own version of this. Choose a commodity runtime.</p><p><strong>Model and inference endpoint</strong> — the LLM itself and the API serving it.</p><p>The sandbox and the harness have opposite design philosophies. The sandbox is subtractive — you’re taking away capabilities to reduce risk. The harness is additive — you’re layering on knowledge and tools to increase competence. If we conflate them, we’ll muddy the design principles that should guide each one.</p><p>They also have different failure modes. A sandbox failure means the agent did something it shouldn’t have been able to do. A harness failure means the agent did something poorly that it should have done well. These are different problems requiring different responses.</p><p>The sandbox has an opportunity to play a secondary role as a recorder — a <a href="https://medium.com/@rbean_3467/supply-chain-security-meets-the-agentic-factory-5a770c34369b">neutral observer</a> of the agent’s activities — that can attest to what it did in a way that’s more worthy of trust than the agent runtime self-attesting.</p><p>The sandbox constrains (and observes). The harness enables (and you can improve it). The runtime executes (and you shouldn’t build your own). We’re building <a href="https://github.com/fullsend-ai/fullsend">fullsend</a> around this decomposition — thinking about supply chain security and a multi-player UX for humans driving the factory. If you’re thinking about similar <a href="https://github.com/fullsend-ai/fullsend/tree/main/docs/problems">problems</a>, I’d love to hear about it.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=f21336768a80" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Supply Chain Security Meets the Agentic Factory]]></title>
            <link>https://medium.com/@rbean_3467/supply-chain-security-meets-the-agentic-factory-5a770c34369b?source=rss-d5309496f692------2</link>
            <guid isPermaLink="false">https://medium.com/p/5a770c34369b</guid>
            <category><![CDATA[software-supply-chain]]></category>
            <category><![CDATA[agentic-ai]]></category>
            <category><![CDATA[agentic-workflow]]></category>
            <dc:creator><![CDATA[ralphbean]]></dc:creator>
            <pubDate>Thu, 19 Mar 2026 18:19:26 GMT</pubDate>
            <atom:updated>2026-03-19T20:53:51.749Z</atom:updated>
            <content:encoded><![CDATA[<h2>The software factory is getting a new floor</h2><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*3Oy3tCSJQkoapvPNfwnBww.png" /></figure><p>Software supply chain security has come a long way. Five years ago, most organizations couldn’t tell you what went into their builds. Today, frameworks like SLSA and SBOM formats like SPDX and CycloneDX give us a shared vocabulary for reasoning about the integrity and materials of the source-to-binary transformation, and platforms like <a href="https://konflux-ci.dev/">Konflux</a> make those ideas practical and accessible.</p><p>At Red Hat, we’ve been investing heavily in this space. Konflux is an open source, cloud-native software factory focused on supply chain security. It handles builds, provenance, vulnerability detection, and compliance verification — and it does it in a way that’s developer-friendly, integrating with the git workflows engineers already use.</p><p>I want to talk about what we’ve learned building Konflux and why I think those lessons are about to matter in a completely new context.</p><h3>What “secured the build” actually means</h3><p>When we say we’ve secured the source-to-binary transformation, we mean several specific things:</p><p><strong>Provenance.</strong> Every build produces a signed <a href="https://in-toto.io/">in-toto attestation</a> that captures what happened. Not just “this artifact was built from this commit” — but which task images ran, what parameters were passed, which dependencies were fetched, and the digests of every input. I wrote about this in detail in <a href="https://developers.redhat.com/articles/2025/05/15/how-we-use-software-provenance-red-hat">How we use software provenance at Red Hat</a>. The level of detail matters. A provenance attestation that only tells you the source commit and the build system is like a medical record that only tells you the patient’s name and the hospital. You can’t make meaningful decisions from it.</p><p><strong>The neutral observer.</strong> This is the architectural insight I’m proudest of. If you want confidence in a software attestation, the key that signs it shouldn’t be available to the build process itself. In Konflux, <a href="https://tekton.dev/docs/chains/">Tekton Chains</a> watches build pipelines from the outside, records what happened, and signs the attestation with credentials the build never touches. The build doesn’t even know it’s being observed. We call this the “neutral observer pattern”. It’s the way we achieve SLSA build level 3. It’s our strategy for making sure a rogue build workload can’t sign false statements about itself.</p><p><strong>Hermetic builds.</strong> A traditional build can reach out to the network at build time and pull whatever it wants. You have no way of knowing everything that went into the artifact. <a href="https://hermetoproject.github.io/hermeto/">Hermeto</a> solves this by pre-fetching all dependencies before the build starts, then running the build with the network disabled. The result: a complete manifest of every ingredient, and confidence that nothing was smuggled in at build time. Hermeto supports Go, Python, Rust, npm, yarn, Ruby, RPM, and more — and it’s strict by design. Dependencies must be declared, pinned, and checksummed. (See also Adam Cmiel’s wonderful talk at OSS NA <a href="https://www.youtube.com/watch?v=cwmdQI6uWWA&amp;list=PL-W3mvmFLwxEiSmmVSHNiRw06Ybk2Z_a9&amp;index=2">“Lock the Chef in the Kitchen”</a>.)</p><p><strong>Contextual SBOMs.</strong> A flat list of packages in a container image isn’t very useful when you need to respond to a vulnerability. Did you introduce that package, or did it come from your parent image? Is it from a builder stage that doesn’t even ship in the final artifact? The <a href="https://developers.redhat.com/articles/2026/02/17/how-contextual-sbom-pattern-improves-vulnerability-management">contextual SBOM pattern</a> adds hierarchical relationships — DESCENDANT_OF and BUILD_TOOL_OF — so you can trace every component to its origin and know exactly who needs to act.</p><p><strong>Policy gates.</strong> Provenance and SBOMs are only useful if something reads them and makes decisions. In Konflux, the Conforma policy engine evaluates attestations against machine-readable rules before artifacts can be released. Were vulnerability scans performed? Were trusted build tasks used? Did anything tamper with sources between git clone and build? Different products can set different bars — prototypes get a lower standard, GA releases get a higher one. The policy is the contract between the build system and the release process.</p><p>These ideas work together as a system. Hermetic builds ensure you know the ingredients. Provenance attestations capture the process. The neutral observer ensures the attestation is trustworthy. Contextual SBOMs make the ingredients actionable. And policy gates enforce it all before anything ships.</p><h3>A new transformation has entered the chat</h3><p>The supply chain just got longer.</p><p>A growing share of source code is now written by AI agents. Industry estimates put AI-assisted code at around 41% of new code, and the trend is accelerating. My colleague’s team at Red Hat is working on <a href="https://ambient-code.ai/">Ambient Code</a>, an agentic software engineering platform exploring what happens when engineers shift from writing code to shepherding it. The vision is agents that handle routine implementation while humans focus on intent, direction, and oversight.</p><p>This isn’t hypothetical. It’s happening now, across the industry. And it means the supply chain isn’t just <strong>source → binary</strong> anymore. It’s:</p><p><strong>intent → source → binary</strong></p><p>We’ve spent years securing the second half of that chain. The first half — the transformation from human intent to source code — is largely unexamined from a supply chain security perspective.</p><h3>The new trust boundary</h3><p>When an AI agent generates source code, a compromised or manipulated model could inject subtle vulnerabilities at authoring time. The generated code passes review — it looks reasonable, it follows conventions, it passes tests. The downstream build pipeline is hermetic and attested. The provenance is clean. Everything from source to deployed artifact is fully accounted for.</p><p>But the vulnerability was introduced before any of that machinery kicked in. It was introduced in the intent-to-source transformation, and we have no attestation infrastructure for that step.</p><p>In the Konflux community, we’ve started <a href="https://github.com/konflux-ci/fullsend">mapping out this problem space</a> under the working title “fullsend” — a vision for fully autonomous agentic engineering in the <a href="https://konflux-ci.dev/">Konflux</a> ecosystem. One of the things we’ve identified is that the existing SLSA framework has a gap here. <a href="https://slsa.dev/spec/v1.0/source-requirements">SLSA Source provenance</a> makes claims about repository governance — is branch protection enabled? Is two-party review enforced? These are important properties, but they don’t describe the act of producing source code. They describe the policies around accepting it.</p><p>What we need is provenance for the transformation itself. And structurally, it looks a lot more like SLSA Build provenance than SLSA Source provenance.</p><h3>What we know about the threat</h3><p>We’ve been developing a <a href="https://github.com/konflux-ci/fullsend">security threat model</a> for agentic development in Konflux:</p><ol><li><strong>External prompt injection</strong> — an attacker manipulates the agent’s inputs (issues, PR descriptions, fetched web content) to influence code generation</li><li><strong>Insider threats / compromised credentials</strong> — someone with access to agent configuration steers it toward malicious outcomes</li><li><strong>Agent drift</strong> — the agent gradually produces lower-quality or subtly wrong code as context accumulates</li><li><strong>Supply chain attacks on the agent itself</strong> — compromised models, poisoned training data, manipulated tool definitions</li></ol><p>These all have a unique challenge: the entire downstream verification chain looks clean. Traditional supply chain attacks on build tools leave traces in the build attestation — unusual tasks, unexpected network calls, modified parameters. An attack on the code-generation model leaves traces in logs of the agent’s operation (or in the model’s training process), which are both largely opaque.</p><p>A large segment of the <a href="https://github.com/konflux-ci/fullsend/blob/main/docs/landscape.md">industry</a> is solving “AI as first-pass reviewer that helps humans review faster,” but I haven’t been able to find anybody who is seriously tackling the full autonomous merge problem with security-focused confidence in the open.</p><p>What’s missing from the industry landscape:</p><ul><li>Formal intent verification</li><li>Zero-trust inter-agent review</li><li>Autonomous merge with security-grade attestation</li><li>Agent governance frameworks</li><li>Provenance for the code generation step itself</li></ul><p>This gap exists because most organizations are still thinking about AI as a developer tool — an assistant that helps humans work faster. Those who are living on the edge with fully-autonomous lights-out systems are doing so at a small organization scale — often only individuals commanding their fleet of agents. The supply chain implications only become visible when you start thinking about AI for the <strong>intent → source</strong> transformation for larger organizations.</p><h2>A supply chain security framework for the agentic factory</h2><p>What would it look like to apply the same principles — provenance, neutral observation, hermeticity, SBOMs, and policy gates — to the agentic software factory?</p><h3>The neutral observer for agents</h3><p>In Konflux, Tekton Chains watches build pipelines from the outside and signs attestations with credentials the build process can’t access. The build doesn’t know it’s being observed. This is the foundation of our trust model.</p><p>The same pattern maps directly to agentic code generation. The agent runs in some environment — a container, a VM, a managed service. A separate process watches that environment from the outside. It records everything the agent does: every tool call, every file read and write, every model invocation, every network request. When the agent finishes, the observer produces a signed attestation summarizing what happened, signed with a key the agent never had access to.</p><p>The agent doesn’t need to cooperate. It doesn’t need to self-report. The observer captures the ground truth independently, just like Tekton Chains captures build provenance independently of the build scripts.</p><h3>What goes in an agent provenance attestation?</h3><p>By analogy with SLSA Build provenance — which captures task images, bundle references, invocation parameters, material digests, and build configuration — an agent provenance attestation should capture:</p><ul><li><strong>Model identity</strong>: Which model was used, at what version. For self-hosted models, a digest of the weights. For hosted APIs, the model ID, API version, and any relevant configuration.</li><li><strong>System prompt and instructions</strong>: The digest of the system prompt, skill definitions, and any CLAUDE.md / AGENTS.md configuration that shaped the agent’s behavior.</li><li><strong>Tool definitions</strong>: What tools were available to the agent and their specifications.</li><li><strong>Retrieval context</strong>: What documents, files, or external content were provided to the agent as context.</li><li><strong>Tool call log</strong>: Every tool invocation — file reads, writes, searches, web fetches, shell commands — with parameters and result digests.</li><li><strong>Network activity</strong>: Every external request the agent made, with URLs and response digests.</li><li><strong>Sampling parameters</strong>: Temperature, top-p, and any other parameters that affect output distribution.</li><li><strong>Token counts and cost</strong>: For auditability and anomaly detection.</li></ul><p>This is the agent equivalent of the detailed task-level provenance that makes Konflux attestations meaningful. As I wrote in <a href="https://developers.redhat.com/articles/2025/05/15/how-we-use-software-provenance-red-hat">How we use software provenance at Red Hat</a>, a provenance attestation that only tells you “an AI wrote this code” is like one that only tells you “this was built on GitHub Actions.” You can’t make policy decisions from it.</p><p>Some special problems there are in there. For one, will it be better to store the refs of <em>git repositories</em> or the digests of <em>OCI artifacts</em> that conveyed the system prompt, skill definitions, and AGENTS.md files to the agent? How do we even specify the content in the <strong>retrieval context</strong> if those elements are blog posts or API responses — what representation will be practical for downstream consumers of such a provenance record to make judgements about the produced source code?</p><h3>The hermetic agent?</h3><p>In Konflux, <a href="https://hermetoproject.github.io/hermeto/">Hermeto</a> pre-fetches all dependencies before the build, then the build runs with the network disabled. This guarantees a complete ingredient list.</p><p>For agents, full hermeticity is probably too restrictive. Agents need to creatively access resources — search the web, read documentation, query APIs. Requiring all inputs to be pre-fetched would cripple their usefulness.</p><p>But we can achieve the same <em>auditability</em> without the same <em>restriction</em>. Instead of “prefetch and disable network,” the pattern becomes “allow network, but intercept and record everything.” A transparent proxy captures every external request the agent makes. The neutral observer includes this in the attestation. The result is a complete manifest of everything the agent touched — an <strong>Agent BOM</strong>.</p><p>We should look to an analogy with <a href="https://developers.redhat.com/articles/2026/02/17/how-contextual-sbom-pattern-improves-vulnerability-management">contextual SBOMs</a> too, that improve on flat package lists. A flat claim of “this commit was generated by these 3 different models” tells us something, but a structured manifest showing exactly which models, contexts, tools, and external resources influenced <em>which parts of the output</em> with some hierarchical relationship tracking will improve our ability to make decisions based on that manifest in the future.</p><p>There may also be a class of agent tasks where full hermeticity <em>is</em> practical — highly constrained tasks with well-defined inputs, like automated dependency updates or mechanical refactoring. For those, a fully hermetic agent run with pre-fetched context would provide the strongest guarantees.</p><h3>Security boundaries: tenant and release engineering workspaces</h3><p>In Konflux, we separate tenant workspaces (where developers build) from managed workspaces (where release engineering operates). The tenant can’t directly push to production. Release pipelines evaluate signed attestations against policy before promoting artifacts.</p><p>The same boundary applies to agentic code generation:</p><ol><li>The agent operates in its own workspace and produces commits on a working branch. It has no push access to the protected branch.</li><li>The neutral observer produces a signed attestation about the agent’s process.</li><li>A policy controller — analogous to <a href="https://github.com/enterprise-contract/ec-cli">Conforma</a> — evaluates the attestation against configurable rules. Was a recognized model used? Were the tool definitions unmodified? Did the agent stay within its authorized scope? Were tests executed and passing?</li><li>Only if policy passes does a privileged process merge to the protected branch.</li></ol><p>The agent is the tenant. The merge authority is the release engineer. The attestation is the bridge between them.</p><p>This is meaningfully different from just “requiring PR approval.” A human approver sees the code diff. The policy controller sees the <em>process</em> — how the code was produced, what influenced it, whether the generation process itself met security requirements.</p><h3>A new provenance type?</h3><p>SLSA currently defines two provenance types: Source (claims about repository governance) and Build (claims about the artifact construction process) — there are some more in the works in the SLSA community. However, the agent <strong>intent → source</strong> transformation doesn’t fit neatly into either.</p><p>SLSA Source provenance claims things like “this repository required two-party review” during a certain time period. That’s a governance property. Build provenance says “this artifact was built from this source, using these tasks, with these parameters.” That’s a process property.</p><p>The provenance for an agent-produced commit should say something like: “this source code was generated from this intent, by this model, with this context, using these tools, through this sequence of actions.” It’s structurally a process property — much closer to Build provenance than Source provenance. But it operates at a different point in the supply chain, with a different subject.</p><h3>Where to store agent-produced commit attestations?</h3><p>For build provenance of container images, storage is elegant: the attestation is attached to the OCI artifact in the registry using cosign. The attestation and the thing it describes live together.</p><p>For agent-generated commits, there’s no equivalent sidecar mechanism. Some options we’re considering:</p><ul><li><strong>Git notes</strong> attached to the commit (discoverable but fragile across forges)</li><li><strong>A </strong><strong>refs/attestations/ namespace</strong> in the repo (similar to what sigstore/gitsign is exploring)</li><li><strong>An external transparency log</strong> indexed by commit SHA (like Rekor, but Rekor shouldn’t store or serve the whole attestation)</li><li><strong>OCI artifacts in a registry</strong>, tagged by commit SHA (reuses existing infrastructure)</li></ul><p>None of these are as clean as the OCI case. This is an open problem we need to mess around with.</p><h3>The full chain</h3><p>When this comes together, the supply chain becomes fully attested end-to-end:</p><pre>intent (human)<br>    ↓ [agent synthesis — attested by neutral observer]<br>source (commits)<br>    ↓ [build — attested by Tekton Chains]<br>binary (OCI artifact)<br>    ↓ [release — policy-gated by Conforma]<br>production</pre><p>Each transformation step has independent attestation, signed by an observer that the transformation process can’t influence. Each step has policy gates that evaluate the attestation before allowing the output to proceed. And each step produces a manifest of its ingredients — an SBOM for the build, an Agent BOM for the synthesis.</p><p>This is part of the vision we’re working toward in <a href="https://github.com/konflux-ci/fullsend">fullsend</a>. And it’s being informed by practical work on agentic development at Red Hat through efforts like <a href="https://ambient-code.ai/">Ambient Code</a>, which is exploring what it means for engineers to shift from writing code to shepherding it. The supply chain security questions become urgent exactly when that shift happens — when code generation moves from “developer tool” to “factory floor process.”</p><h2>Getting involved</h2><p>We’re in a exploratory phase with <a href="https://github.com/konflux-ci/fullsend">fullsend</a> — expanding the problem space, running experiments, and inviting perspectives. The problems documented there span agent architecture, autonomy models, security threat modeling, governance, code review, and more. There are currently a dozen problem domain documents and nearly as many open pull requests with active discussion.</p><p>In the <a href="https://konflux-ci.dev/">Konflux</a> project, we want these ideas to become concrete. Our existing supply chain security stack — hermetic builds, provenance attestations, policy enforcement, contextual SBOMs — provides a foundation. The question now is if and how to extend that foundation to cover the new transformation at the front of the chain.</p><p>If you’re thinking about these problems too, come build with us.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=5a770c34369b" width="1" height="1" alt="">]]></content:encoded>
        </item>
    </channel>
</rss>