feat: make Zero secure by default; before it's too late#67
Open
txbm wants to merge 10 commits into
Open
Conversation
|
@txbm is attempting to deploy a commit to the Vercel Labs Team on Vercel. A member of the Team first needs to authorize it. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
What
Add first class support for trusted signing keys to Zero packages.
zero-keys.mp4
Why
To head off the terrifying timeline where the language for agents is vulnerable to supply chain attacks.
A generational opportunity to secure the agentic future.
How
A trusted key ledger is distributed and mirrored. Root keys stored in secret vaults of sponsoring orgs.
The binary signature verified during installation and root keys are fetched and verified.
Creating a package signs it with a default developer key and includes a ledger to add as many publisher keys to a package as needed.
Running the
shipcommand signs the package with your developer key. Any developer can then verify a package signature given any publisher key or via the global trust chain.Developers that wish to publish globally trusted packages can submit a PR with their public keys for inclusion into the trusted key chain. Trusted key refresh can happen anytime.
Compromised keys get revoked or rotated, signing and verification against compromised keys then fails.
Outcome
All Zero package installation becomes verifiable against either a chain of trust or P2P direct public key exchange.
Important because it reserves optionality to the installing party how to define their trust posture.
Lays foundation for enabling trusted agent identities and securing future package registries and CI.
Implementation
Transcends future infrastructure. Best to bake in now.