Skip to content

Instantly share code, notes, and snippets.

This is a collection of resources supporting the idea that provable runtime security guarantees for agents can be intrinsically bound to agent identity, perhaps as part of a broader representation of "intent", or in a tiered trust model. TEEs, hypervisor-enforced isolation, hardware roots of trust and several Linux security primitives are instrumental to get there. We curate some of the most promising references to date including applied technologies in agent frameworks, research and risk/mitigation-focused literature on this topic.

Agent runtime security

Risk/mitigation literature that discusses the importance of agent runtime security includes:

#!/bin/bash
# Also see: https://gist.github.com/bureado/16df777c1f9883ef919a5cc0c30eaba3
case "$1" in
init)
# Install dependencies
sudo apt update && sudo apt install jq auditd -y
# Start auditd
sudo systemctl start auditd.service
#!/bin/sh
# Video: https://www.youtube.com/watch?v=Rv4ZlbMb1pE&list=PL9GzfK3UKP1vOcUkp3ayByoBY2pT641YN&index=3
# Usage: ./hash-to-buildinfo.sh <.deb package>
# Works with deb packages obtained from a Debian archive
# Assumes rekor CLI is in ./
# This all exists because https://unix.stackexchange.com/a/612931
# https://unix.stackexchange.com/a/673157
#!/bin/sh
# See: https://hackmd.io/@aeva/draft-gitbom-spec
# Also see: https://gist.github.com/bureado/0e4b53e90ac1263b7c5ed908dbe2cb50
# Today I would look at witness, tracee, and many others.
# TODO: make sure $BUILDDIR is a --git-dir
BUILDDIR=$1
TIMEOUT=5

Conceptual SBOM model for an APT-based Linux distribution

This is a draft of an entirely exploratory learning exercise to generate SBOMs from first principles that can accompany an APT-based Linux distribution, which in this context is either a disk or a container image obtained from any source including runtime instances, packaged images, debootstraps, etc. Input and comments welcome: Twitter and also on the CNCF, CycloneDX, CDF, Sigstore and other Slacks.

Status

Here's the current version of the output (SPDX) which features:

  • Identifying information for the primary component (at this time, the debian:latest container image)
  • purl identifiers for each binary package in the image
@bureado
bureado / fosdem-2020.md
Created January 20, 2020 18:08
JMP - FOSDEM 2020 Tracking Gist

The Apache Way

Adapted from Briefing: The Apache Way

The Apache Way is not One Way. Every Apache project is unique and every member describes their experience with their own words. But here are some attributes that everyone in Apache embraces.

People

Apache is made of people, not organizations. Contributions are voluntary and all votes weigh the same. A strong community can always make good code better.

@bureado
bureado / k-docs-es-tips.md
Last active May 28, 2019 21:25
Tips & tricks #kubernetes-docs-es

Tips & tricks para contribuir a #kubernetes-docs-es

¿Por dónde empiezo?

Este documento no sustituye los lineamientos de estilo y procedimientos formales del proyecto. Te sugerimos las siguientes lecturas previas: