Supply Chain Security
As part of the http4k Enterprise Edition, every http4k artifact is published with cryptographically signed provenance, complete dependency transparency, and verified build attestations - giving your organisation the supply chain assurance it needs to ship with confidence.
With increasing regulatory pressure from the EU Cyber Resilience Act (CRA), US Executive Order 14028, NIST SSDF, and PCI DSS 4.0, organisations need to demonstrate full visibility into their software supply chain. http4k delivers this out of the box - every build produces SLSA Level 2 provenance linking artifacts to the exact source commit and CI pipeline, CycloneDX SBOMs detailing all transitive dependencies, and cosign signatures with trusted timestamps from the Sigstore Timestamp Authority.
What Gets Published#
For every http4k module, the following provenance artifacts are published as classified Maven artifacts alongside the standard JARs and POMs:
| Artifact | Description |
|---|---|
| CycloneDX SBOM | Machine-readable bill of materials listing all transitive dependencies |
| JAR signature | Cosign signature bundle for the compiled JAR |
| License report | Curated license compliance report for all dependencies |
| SLSA provenance | Build L2 provenance attestation linking artifact to source commit and CI pipeline |
| Cosign bundles | Sigstore signature bundle for each of the above, with trusted timestamps |
See the Enterprise Repository reference for Maven coordinates, repository layout, and setup guides.
License Compliance#
Every http4k module includes a signed license compliance report listing the licenses of all transitive dependencies, checked against http4k’s curated approved license list. This gives your legal and compliance teams immediate visibility into the licensing of every component in your dependency tree.
Each report is signed with the same cosign key as all other provenance artifacts, and covers the specific module’s transitive dependencies - so you get exactly the license information relevant to the http4k modules you actually use.
SLSA Provenance Format#
Each provenance attestation follows the in-toto Statement v1 specification with a SLSA Provenance v1 predicate. The attestation links each artifact to:
- The exact git commit that produced it
- The GitHub Actions workflow that built it
- The build invocation ID for full traceability
- SHA-256 digests of all subject artifacts
SLSA Level 3 Provenance#
All http4k Enterprise Edition artifacts are published with SLSA Level 2 provenance as standard. For organisations with enhanced compliance requirements, we also offer SLSA Level 3 provenance on a per-customer basis.
SLSA Level 3 adds build platform isolation guarantees - artifacts are built on hardened, tamper-resistant CI infrastructure where the build process is fully isolated and cannot be influenced by project maintainers or external actors. This provides the highest level of supply chain assurance available.
To discuss SLSA Level 3 provenance for your organisation, contact us.
Verifying Artifacts#
The http4k Verify plugin provides automatic build-time verification of all http4k artifact signatures. It exports all verification artifacts (SBOMs, provenance, license reports, sigstore bundles) to your project directory for independent inspection, and generates a JSON attestation report as proof that your http4k dependencies were validated.
See the http4k Verify reference documentation for full setup, configuration, and usage details - including manual verification with cosign and Gradle’s built-in dependency verification.
SLSA Level 2 Provenance
Know exactly where every artifact came from. Each build is cryptographically linked to the source commit and CI pipeline that produced it, giving your security team complete traceability.
CycloneDX SBOMs
Stay ahead of compliance requirements with machine-readable Software Bills of Materials for every module, ready for audit and vulnerability scanning out of the box.
License Compliance
Signed, per-module license reports delivered with every artifact - ready for audit and regulatory review.
