Skip to content

Integrate agent-sign into publish action for Sigstore attestation#17

Open
terraboops wants to merge 3 commits intomainfrom
claude/integrate-agent-sign-action-YPKol
Open

Integrate agent-sign into publish action for Sigstore attestation#17
terraboops wants to merge 3 commits intomainfrom
claude/integrate-agent-sign-action-YPKol

Conversation

@terraboops
Copy link
Collaborator

Bake always-further/agent-sign into the publish composite action so
marketplace files are automatically signed with Sigstore keyless
attestation before PR creation. The .bundle sidecar files are picked
up by create-pull-request and included in the generated PR.

  • Add sign step to publish/action.yml (on by default, SHA-pinned)
  • Add sign-files input + id-token permission to reusable workflow
  • Add id-token: write to update-marketplace template
  • Add test-sign job to test.yml

https://claude.ai/code/session_01VeXZGRwCdMMNLA1H4JAW3w

Bake always-further/agent-sign into the publish composite action so
marketplace files are automatically signed with Sigstore keyless
attestation before PR creation. The .bundle sidecar files are picked
up by create-pull-request and included in the generated PR.

- Add sign step to publish/action.yml (on by default, SHA-pinned)
- Add sign-files input + id-token permission to reusable workflow
- Add id-token: write to update-marketplace template
- Add test-sign job to test.yml

https://claude.ai/code/session_01VeXZGRwCdMMNLA1H4JAW3w
Copy link

@claude claude bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Code review skipped — your organization's overage spend limit has been reached.

Code review is billed via overage credits. To resume reviews, an organization admin can raise the monthly limit in Settings → Usage.

Once credits are available, reopen this pull request to trigger a review.

claude added 2 commits March 21, 2026 00:11
Explain what the signatures are, how they work, how users verify them
with nono trust verify, what a trust-policy.json looks like, what
attacks this prevents, and how to use nono run for runtime enforcement.

https://claude.ai/code/session_01VeXZGRwCdMMNLA1H4JAW3w
Answer common questions: whether nono is required, whether .bundle
files break anything, gitignore guidance, id-token permission safety,
retroactive verification, and when to disable signing.

https://claude.ai/code/session_01VeXZGRwCdMMNLA1H4JAW3w
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants