Security
Security of released binaries
Binaries published in the Releases section of GitHub are the output of a process that is fully visible, both in terms of “ingredients” (the source code) and “recipe” (the process steps), and verifiable by third parties. This should prevent external interferences and guarantee security. This is the process:
During every release, the Release workflow is triggered on GitHub.
The release workflow pulls the source code and builds binaries.
The release workflow computes SHA256 checksums of binaries and publishes them to the Sigstore Public Good Instance through GitHub Attestations.
Checksums and binaries are published on the Release page.
Binaries can be downloaded by users.
It is possible to verify that SHA256 checksums of binaries correspond to the one published on Sigstore by running:
ls mediamtx_* | xargs -L1 gh attestation verify --repo bluenviron/mediamtxIt is possible to verify that binaries have not been altered during transfer from GitHub to the final destination by downloading checksums.sha256 and running:
cat checksums.sha256 | grep "$(ls mediamtx_*)" | sha256sum --checkReporting vulnerabilities
Vulnerabilities can be reported privately by using the Security Advisory feature of GitHub.