Verify the provenance and integrity of release artifacts published by this repository. Each release includes cryptographic attestations generated through GitHub Actions using Sigstore keyless signing, providing tamper-evident proof that artifacts were built from this repository’s source code.
| Requirement | Minimum Version | Purpose |
|---|---|---|
| GitHub CLI | 2.49.0+ | gh attestation verify subcommand for validation |
Install or update GitHub CLI: https://cli.github.com/
Download the release artifact from the GitHub Releases page, then verify its provenance attestation:
gh attestation verify source-v1.2.3.tar.gz \
--repo microsoft/physical-ai-toolchain
Replace source-v1.2.3.tar.gz with the actual release artifact filename.
To verify the SBOM attestation specifically:
gh attestation verify source-v1.2.3.tar.gz \
--repo microsoft/physical-ai-toolchain \
--predicate-type https://spdx.dev/Document
Successful verification proves three properties:
Each release includes an SPDX SBOM attestation. Download and inspect the SBOM contents using the GitHub CLI and jq:
gh attestation verify source-v1.2.3.tar.gz \
--repo microsoft/physical-ai-toolchain \
--predicate-type https://spdx.dev/Document \
--format json | jq '.verificationResult.statement.predicate'
The SBOM follows the SPDX 2.3 specification and lists all package dependencies included in the release artifact.