-
Notifications
You must be signed in to change notification settings - Fork 4
Open
Labels
area/securitySecurity-related issuesSecurity-related issuesenhancementNew feature or requestNew feature or requestpriority/mediumMedium priorityMedium priority
Description
Context
The CI pipeline currently has no SAST, container image scanning, or supply chain provenance. As the project grows (31 stars and climbing), this is increasingly expected by enterprise adopters and the K8s ecosystem.
Proposed Additions
Container Scanning
- Add Trivy or Grype scan step to the release workflow for
ghcr.io/defilantech/llmkube-controllerimages - Fail releases on critical/high CVEs
Dependency Scanning
- Add
govulncheckto the lint or test workflow - Complements Dependabot by catching Go-specific vulnerabilities
SLSA Provenance
- Add SLSA provenance generation to GoReleaser output
- Enables users to verify build provenance via
cosign verify-attestation
Signed Images
- Sign container images with cosign/sigstore
- Publish signatures alongside images in GHCR
Priority
Medium — not blocking any current functionality but important for trust as adoption grows, especially in air-gapped/compliance environments where LLMKube is positioned.
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
area/securitySecurity-related issuesSecurity-related issuesenhancementNew feature or requestNew feature or requestpriority/mediumMedium priorityMedium priority