Only the latest release is supported with security fixes.
| Version | Supported |
|---|---|
| latest | ✅ |
| < latest | ❌ |
Please DO NOT open a public issue for security reports.
Use GitHub Private Vulnerability Reporting or email: security@colangelo.dev
Include:
- Version or commit hash
- OS and architecture
- Steps to reproduce
- Expected vs actual behavior
You can expect an initial response within 48 hours. If confirmed, a fix will be prioritized and credited in the release notes (unless you prefer to remain anonymous).
Does:
- Perform outbound HTTP/HTTPS/HTTP3 requests to user-specified URLs
- Display latency statistics in the terminal
Does NOT:
- Execute shell commands
- Collect telemetry or analytics
- Phone home or make requests to any URL other than the user-specified target
- Store any data persistently
- Require elevated privileges
All release binaries are signed with Sigstore cosign using GitHub Actions OIDC.
Each release includes:
hp-<os>-<arch>- the binaryhp-<os>-<arch>.sig- cosign signaturehp-<os>-<arch>.pem- signing certificatechecksums.txt- SHA256 checksumschecksums.txt.sig/checksums.txt.pem- signed checksums
Use this when downloading directly from GitHub releases instead of using a package manager.
# Requires: cosign (https://docs.sigstore.dev/cosign/system_config/installation/)
OS=$(uname -s | tr '[:upper:]' '[:lower:]') && \
ARCH=$(uname -m | sed 's/x86_64/amd64/;s/aarch64/arm64/') && \
BIN="hp-${OS}-${ARCH}" && \
BASE_URL="https://github.com/colangelo/HittyPing/releases/latest/download" && \
curl -sLO "${BASE_URL}/${BIN}" && \
curl -sLO "${BASE_URL}/${BIN}.sig" && \
curl -sLO "${BASE_URL}/${BIN}.pem" && \
cosign verify-blob \
--signature "${BIN}.sig" \
--certificate "${BIN}.pem" \
--certificate-oidc-issuer https://token.actions.githubusercontent.com \
--certificate-identity-regexp 'github.com/colangelo/HittyPing' \
"${BIN}"Or if you have the repo cloned: just verify-release
Use this to verify that your installed hp binary matches the official signed release.
# Requires: cosign
HP_PATH=$(which hp) && \
VERSION=$(${HP_PATH} --version | grep -oE '[0-9]+\.[0-9]+\.[0-9]+') && \
OS=$(uname -s | tr '[:upper:]' '[:lower:]') && \
ARCH=$(uname -m | sed 's/x86_64/amd64/;s/aarch64/arm64/') && \
BIN="hp-${OS}-${ARCH}" && \
BASE_URL="https://github.com/colangelo/HittyPing/releases/download/v${VERSION}" && \
curl -sLO "${BASE_URL}/${BIN}.sig" && \
curl -sLO "${BASE_URL}/${BIN}.pem" && \
cosign verify-blob \
--signature "${BIN}.sig" \
--certificate "${BIN}.pem" \
--certificate-oidc-issuer https://token.actions.githubusercontent.com \
--certificate-identity-regexp 'github.com/colangelo/HittyPing' \
"${HP_PATH}" && \
rm -f "${BIN}.sig" "${BIN}.pem"Or if you have the repo cloned: just verify-installed
# Download the binary and checksums
curl -LO https://github.com/colangelo/HittyPing/releases/latest/download/hp-darwin-arm64
curl -LO https://github.com/colangelo/HittyPing/releases/latest/download/checksums.txt
# Verify
sha256sum -c checksums.txt --ignore-missing
# or on macOS:
shasum -a 256 -c checksums.txt --ignore-missingCosign verification ensures:
- The binary was built by GitHub Actions (not a compromised maintainer)
- The binary hasn't been tampered with since release
- You're running exactly what was built from the source code