Security & DevSecOps Practical By Samson Tanimawo, PhD Published Jul 31, 2025 4 min read

Supply Chain Attestation Tools

Tools for SLSA: sigstore, cosign, in-toto.

Sigstore

Supply-chain attestation needs tools that turn the conceptual goal (prove the artifact is what we say it is) into an operational practice. The ecosystem has converged on a specific stack: Sigstore for signing, in-toto for attestations, and CI integration that makes both routine. Teams adopting this stack today get supply-chain integrity with minimal operational overhead.

What Sigstore offers:

Sigstore is the modern default for software signing. Teams not using it are either using older tooling (which has known gaps) or are not signing at all (which has bigger gaps).

in-toto

Sigstore signs artifacts. The complement is in-toto, which produces attestations: structured statements about how an artifact was built. The signature alone proves "this artifact is from this signer"; in-toto attestations prove "this artifact was built through this specific process from these specific inputs."

in-toto is the structured attestation format. Combined with Sigstore signing, it produces verifiable supply-chain claims that survive independent verification.

Integrate

The third leg is CI integration. Modern CI platforms ship Sigstore and in-toto integration as built-in features. The team configures the workflow to produce signed attestations; the CI does the rest.

Sigstore for signing, in-toto for attestations, and CI integration for the workflow together produce the modern supply-chain integrity stack. Nova AI Ops integrates with the major signing and attestation tools, surfaces the cases where production artifacts lack expected attestations, and tracks the supply-chain coverage across the artifact registry so the security team has visibility into the chain.