model-supply-chain-security
SKILL.md
Model Supply Chain Security
Protect models and inference components from tampering, dependency compromise, and untrusted artifact promotion.
Threats
- Poisoned pretrained weights or adapters
- Malicious model conversion tools or loaders
- Compromised build pipelines and registries
- Insecure runtime images with critical CVEs
Control Objectives
- Verify artifact integrity end-to-end
- Prove provenance for every promoted model
- Detect vulnerable dependencies before deploy
- Restrict execution to trusted signed artifacts
Recommended Controls
- Generate SBOMs for model-serving images and dependencies.
- Sign model artifacts and containers (Cosign/Sigstore).
- Enforce provenance attestations in CI/CD.
- Gate deployments with policy-as-code.
- Continuously scan registries for CVEs and drift.
Promotion Policy Example
A model can move to production only when:
- checksum matches signed manifest,
- provenance references approved build workflow,
- no unresolved critical vulnerabilities,
- security and platform approvals are present.
Runtime Hardening
- Run inference containers as non-root.
- Apply egress restrictions to prevent unauthorized downloads.
- Mount model volumes read-only when possible.
- Alert on unsigned artifact pull attempts.
Related Skills
- sbom-supply-chain - Generate SBOM and provenance evidence
- container-hardening - Harden runtime container posture
- model-registry-governance - Controlled lifecycle and approvals
Weekly Installs
3
Repository
bagelhole/devop…t-skillsGitHub Stars
13
First Seen
6 days ago
Security Audits
Installed on
opencode3
antigravity3
claude-code3
github-copilot3
codex3
zencoder3