Skip to content

Add GitHub artifact attestations for release binaries #542

@cv

Description

@cv

Request

Please add GitHub artifact attestations to the release workflow so downstream consumers can cryptographically verify binary provenance.

Why

NemoClaw downloads OpenShell binaries in its install scripts. Today we hardcode SHA-256 checksums to verify integrity, but this creates a maintenance burden — every new OpenShell release requires a manual hash update on our side.

The openshell-checksums-sha256.txt release asset helps, but downloading checksums from the same source as the binary doesn't add real security: if a release is compromised, both files can be tampered with.

With artifact attestations, downstream projects can verify binaries with a single command:

gh attestation verify openshell-aarch64-apple-darwin.tar.gz --repo NVIDIA/OpenShell

No hardcoded hashes, cryptographically signed provenance, zero maintenance for consumers.

Context

Metadata

Metadata

Assignees

No one assigned

    Labels

    area:buildRelated to CI/CD and builds

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions