Join us

ContentUpdates and recent posts about Sigstore..
Link
@kaptain shared a link, 2 months, 1 week ago
FAUN.dev()

Why Kubernetes is retiring Ingress NGINX

The Kubernetes Steering Committee is pulling the plug onIngress NGINX- official support ends March 2026. No more updates. No security patches. Gone. Why? It's been coasting on fumes. One or two part-time maintainers couldn't keep up. The tech debt piled up. Now it's a security liability. What's next.. read more  

Why Kubernetes is retiring Ingress NGINX
Link
@kaptain shared a link, 2 months, 1 week ago
FAUN.dev()

How Kubernetes Learned to Resize Pods Without Restarting Them

Kubernetes v1.35 introduces in-place Pod resizing, allowing dynamic adjustments to CPU and memory limits without restarting containers. This feature addresses the operational gap of vertical scaling in Kubernetes by maintaining the same Pod UID and workload identity during resizing. With this breakt.. read more  

How Kubernetes Learned to Resize Pods Without Restarting Them
Link
@kaptain shared a link, 2 months, 1 week ago
FAUN.dev()

Introducing Node Readiness Controller

Kubernetes just dropped theNode Readiness Controller- a smarter way to track node health. It slaps taints on nodes based on custom signals, not just the plain old "Ready" status. The goal? Safer pod scheduling that actually reflects what’s going on under the hood. It's powered by theNodeReadinessRul.. read more  

Link
@kaptain shared a link, 2 months, 1 week ago
FAUN.dev()

How GKE Inference Gateway improved latency for Vertex AI

Vertex AI now plays nice withGKE Inference Gateway, hooking into the Kubernetes Gateway API to manage serious generative AI workloads. What’s new:load-awareandcontent-aware routing. It pulls from Prometheus metrics and leverages KV cache context to keep latency low and throughput high - exactly what.. read more  

How GKE Inference Gateway improved latency for Vertex AI
Link
@kaptain shared a link, 2 months, 1 week ago
FAUN.dev()

CVE-2026-22039: Kyverno Authorization Bypass

Kyverno - a CNCF policy engine for Kubernetes - just dropped a critical one:CVE-2026-22039. It lets limited-access users jump namespaces by hijacking Kyverno'scluster-wide ServiceAccountthrough crafty use of policy context variable substitution. Think privilege escalation without breaking a sweat. I.. read more  

CVE-2026-22039: Kyverno Authorization Bypass
Link
@kala shared a link, 2 months, 1 week ago
FAUN.dev()

Self-Optimizing Football Chatbot Guided by Domain Experts on

Generic LLM judges and static prompts fail to capture domain-specific nuance in football defensive analysis. The architecture for self-optimizing agents built on Databricks Agent Framework allows developers to continuously improve AI quality using MLflow and expert feedback. The agent, such as a DC .. read more  

Link
@kala shared a link, 2 months, 1 week ago
FAUN.dev()

My AI Adoption Journey

A dev walks through the shift from chatbot coding toagent-based AI workflows, think agents that read files, run code, and double-check their work. Things only clicked once they built outcustom tools and configsto help agents spot and fix their own screwups. That’s the real unlock... read more  

Link
@kala shared a link, 2 months, 1 week ago
FAUN.dev()

Generative Pen-trained Transformer

MeetGPenT, an open-source, wall-mounted polargraph pen plotter with a flair for generative art. It blends custom hardware, Marlin firmware, a Flask web UI running on Raspberry Pi, and Gemini-generated drawing prompts. The stack? Machina + LLM. Prompts go in, JSON drawing commands come out. That driv.. read more  

Link
@kala shared a link, 2 months, 1 week ago
FAUN.dev()

Towards self-driving codebases

OpenAI spun up a swarm of GPT-5.x agents - thousands of them. Over a week-long sprint, they cranked out runnable browser code and shipped it nonstop. The system hit 1,000 commits an hour across 10 million tool calls. The architecture? A planner-worker stack. Hierarchical. Recursive. Lean on agent ch.. read more  

Towards self-driving codebases
Link
@kala shared a link, 2 months, 1 week ago
FAUN.dev()

Nathan Lambert: Open Models Will Never Catch Up

Open models will be the engine for the next ten years of AI research, according to Nathan Lambert, a research scientist at AI2. He explains that while open models may not catch up with closed ones due to fewer resources, they are still crucial for innovation. Lambert emphasizes the importance of int.. read more  

Nathan Lambert: Open Models Will Never Catch Up
Sigstore is an open source initiative designed to make software artifact signing and verification simple, automatic, and widely accessible. Its primary goal is to improve software supply chain security by enabling developers and organizations to cryptographically prove the origin and integrity of the software they build and distribute.

At its core, sigstore removes many of the traditional barriers associated with code signing. Instead of managing long-lived private keys manually, sigstore supports keyless signing, where identities are issued dynamically using OpenID Connect (OIDC) providers such as GitHub Actions, Google, or Microsoft. This dramatically lowers operational complexity and reduces the risk of key compromise.

The sigstore ecosystem is composed of several key components:

- Cosign: A tool for signing, verifying, and storing signatures for container images and other artifacts. Signatures are stored alongside artifacts in OCI registries, rather than embedded in them.

- Fulcio: A certificate authority that issues short-lived X.509 certificates based on OIDC identities, enabling keyless signing.

- Rekor: A transparency log that records signing events in an append-only, tamper-evident ledger. This provides public auditability and detection of suspicious or malicious signing activity.

Together, these components allow anyone to verify who built an artifact, when it was built, and whether it has been tampered with, using publicly verifiable cryptographic proofs. This aligns closely with modern supply chain security practices such as SLSA (Supply-chain Levels for Software Artifacts).

sigstore is widely adopted in the cloud-native ecosystem and integrates with tools like Kubernetes, container registries, CI/CD pipelines, and package managers. It is commonly used to sign container images, Helm charts, binaries, and SBOMs, and is increasingly becoming a baseline security requirement for production software delivery.

The project is governed by the OpenSSF (Open Source Security Foundation) and supported by major industry players.