
Security News
TypeScript is Porting Its Compiler to Go for 10x Faster Builds
TypeScript is porting its compiler to Go, delivering 10x faster builds, lower memory usage, and improved editor performance for a smoother developer experience.
Security News
Sarah Gooding
February 6, 2025
Sonatype recently announced that the Maven Central Publisher Portal now validates Sigstore signatures, making it easier for developers to verify the provenance of Java packages. While not required for publishing, this update improves trust in published artifacts by ensuring that signed packages can be cryptographically validated at the time of publishing.
With this update, developers publishing Java packages to Maven Central can now include Sigstore signatures (.sigstore.json files) alongside their artifacts. The Central Publisher Portal will validate these signatures, providing warnings if verification fails.
For package consumers, this means Sigstore signatures can be used to verify package provenance, but they will exist alongside traditional PGP signatures for the foreseeable future.
Maven Central’s announcement states that they “have no intention of replacing PGP signatures” with Sigstore signatures, as the PGP standards has served the repository well over the years but will consider replacing it in the future depending on adoption:
We are monitoring adoption of Sigstore and may eventually make both Sigstore and PGP signatures required for publishing. If the community adopts Sigstore, there is a possible future where it replaces PGP as the required signature standard for Maven Central. What we can guarantee is that there will always be a way to cryptographically verify components that are downloaded from Maven Central.
Sigstore is designed to simplify the cryptographic signing process while maintaining strong security guarantees. It eliminates the need for long-lived private keys by using keyless signing, where ephemeral signing keys are tied to a developer’s identity provider (such as GitHub, Google, or Microsoft). This makes signing easier to adopt and verify compared to traditional PGP.
Maven Central’s validation ensures that if a publisher chooses to provide Sigstore signatures, consumers can verify them with confidence, avoiding issues like misconfigured or improperly formatted signatures.
Cryptographic signatures play an important role in securing the software supply chain, but they do not guarantee that code is safe.
A signed package tells you who published it and that it wasn’t tampered with after signing, but it does not prevent an attacker from injecting malicious code before a package is signed. The recent Ultralytics supply chain attack demonstrated this risk—malicious code was introduced into a signed and published package due to a compromised CI/CD cache. The fact that the package was signed did not prevent or even help detect the attack.
This highlights why signing should be part of a layered security strategy that includes:
The introduction of Sigstore validation in Maven Central reflects a broader industry shift toward stronger package provenance and verifiable software supply chains. Across ecosystems, package signing is becoming more widely adopted:
Maven Central’s adoption of Sigstore validation signals continued momentum for more standardized, automated, and scalable package provenance. While PGP remains the default in Java, the increasing adoption of Sigstore could eventually lead to a shift in signing standards across the Java ecosystem.
For developers, this is a good time to explore how signing fits into a broader security strategy, not as a replacement for other security measures, but as an additional tool to help verify trust in open source dependencies.
Subscribe to our newsletter
Get notified when we publish new security blog posts!
Try it now
Security News
TypeScript is porting its compiler to Go, delivering 10x faster builds, lower memory usage, and improved editor performance for a smoother developer experience.
Research
Security News
The Socket Research Team has discovered six new malicious npm packages linked to North Korea’s Lazarus Group, designed to steal credentials and deploy backdoors.
Security News
Socket CEO Feross Aboukhadijeh discusses the open web, open source security, and how Socket tackles software supply chain attacks on The Pair Program podcast.