Signed attestations that prove how a build artifact was produced.
SLSA (Supply-chain Levels for Software Artifacts) is an OpenSSF framework for proving, cryptographically, that a build artifact came out of a specific pipeline running specific source code on a specific builder. Provenance is the signed document that carries that evidence.
Provenance is typically expressed in the in-toto attestation format: a JSON payload that names the artifact by hash, lists the source repository and commit, names the builder, and is signed (commonly via Sigstore / Fulcio / Rekor). A consumer verifies the signature, checks the source and builder against policy, and only then trusts the binary.
SLSA defines four levels of assurance, each adding controls that close a specific class of supply-chain attack:
SolarWinds, 3CX, and Codecov all shipped clean-looking source code and still compromised downstream customers — because the build pipeline itself was modified. Reviewing the source only tells you about one attack surface. SLSA provenance closes the other one.
Provenance also gives consumers a cryptographic answer to "did this binary really come from the repo you claim?" That answer is increasingly a procurement requirement, a CRA expectation, and — for anyone serving US federal customers — a matter of attestation under EO 14028 / M-22-18.
A SolarWinds-style attack that modifies the builder is detectable — the resulting provenance does not match your policy and the binary fails admission.
Every deployed binary can be traced back to a specific commit, builder run, and reviewer — without trusting the producer's word for it.
EO 14028 attestation and tier-1 enterprise supplier questionnaires increasingly expect signed provenance. Shipping it is cheaper than explaining why you do not.
Kubernetes admission policies and Cosign verification can reject any artifact without matching provenance — a real, enforceable supply-chain gate.
Provenance, SBOM, and VEX together form the evidence bundle that regulators are converging on. Same infrastructure, compounding value.
Safeguard generates, stores, and verifies SLSA provenance as part of SBOM Studio and the supply-chain compliance workflow. Provenance sits alongside SBOMs as part of each product's evidence bundle.
Point Safeguard at a pipeline. Generate, store, and verify SLSA-compliant attestations for every artifact.