Standards TrackerAugust 1, 20253 min read

SLSA Level 3 Attestations

Non-falsifiable provenance for agentic infrastructure.

Problem

Users must be able to verify exactly who built the HELM binary, from what source repository, and confirm the build runner was not tampered with.

Approach

We sign every release using Sigstore's keyless infrastructure (OIDC) to generate in-toto attestations. These attestations meet Supply chain Levels for Software Artifacts (SLSA) Level 3 requirements, linking the binary blob back to the GitHub Actions runner and the exact Git SHA.

Invariants

  • Attestations must be signed by the official Mindburn Labs CI identity.
  • Attestation payload must contain the exact sha256 digest of the distributed artifact.

Artifacts

References

  • SLSA specification (slsa.dev)

Mindburn Labs Research β€’ August 1, 2025
Every claim in this article can be independently verified using our open-source evidence tooling and standards documentation.
SLSA Level 3 Attestations β€” Mindburn Research | Mindburn Labs