Skip to content

Discourage (disallow?) naked cosign verify invocations #2056

Closed
@znewman01

Description

@znewman01

Inspired by sigstore/sigstore-python#155

cosign verify (in keyless mode) without any --cert-email provided will succeed when literally anybody has signed an image/blob. This is almost never the right behavior: evil@hacker.com can sign any blob you can.

Instead, we should require some verification policy:

(Keyfull mode is okay, because you're passing the key material or CA in explicitly)

Metadata

Metadata

Assignees

Labels

bugSomething isn't working

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions