New ask Hacker News story: SEL Deploy – Cryptographically chained deployment timeline
SEL Deploy – Cryptographically chained deployment timeline
2 by chokriabouzid | 1 comments on Hacker News.
We wasted hours in post-mortems reconstructing "what deployed when." SEL Deploy creates a tamper-evident deployment timeline: • Each deployment: command hash, git commit, timestamp, exit code • Chained to previous (tampering breaks the chain) • Signed with Ed25519 (non-repudiable) • Local SQLite for fast timeline queries Try it: git clone https://ift.tt/QmKbjce cd sel-deploy cargo build --release ./target/release/sel-deploy keygen ./target/release/sel-deploy run -- echo "hello world" Built on SEL Core (deterministic engine, 33/33 tests). Open source (MIT). No SaaS. Fully local. GitHub: https://ift.tt/QmKbjce
2 by chokriabouzid | 1 comments on Hacker News.
We wasted hours in post-mortems reconstructing "what deployed when." SEL Deploy creates a tamper-evident deployment timeline: • Each deployment: command hash, git commit, timestamp, exit code • Chained to previous (tampering breaks the chain) • Signed with Ed25519 (non-repudiable) • Local SQLite for fast timeline queries Try it: git clone https://ift.tt/QmKbjce cd sel-deploy cargo build --release ./target/release/sel-deploy keygen ./target/release/sel-deploy run -- echo "hello world" Built on SEL Core (deterministic engine, 33/33 tests). Open source (MIT). No SaaS. Fully local. GitHub: https://ift.tt/QmKbjce
Comments
Post a Comment