Atmos Toolchain Now Verifies Package Checksums and Signatures
Atmos toolchain installs now verify downloaded packages before extraction when registry metadata provides checksums, signatures, or attestations.
What Changed
Atmos now preserves and evaluates Aqua-compatible verification metadata during toolchain installs:
- Checksum files from GitHub releases and HTTP sources are downloaded and parsed before extraction.
rawandregexpchecksum formats are supported with templated asset names such as.Assetand.AssetWithoutExt.sha256,sha512,sha1, andmd5digests are supported.- Signature and attestation metadata can invoke
cosign verify-blob,slsa-verifier verify-artifact,gh attestation verify, andminisign -Vm. - Verified package URL, checksum, size, and verification methods are recorded in the toolchain lockfile with backward-compatible optional fields.
By default, Atmos verifies checksums and signatures when metadata exists, while still allowing packages without verification metadata to install.
Why This Matters
Toolchain packages are often fetched directly from release assets, so download integrity matters as much as version pinning. With supply-chain attacks and compromised package artifacts becoming routine operational risks, verifying that a downloaded archive is the artifact the publisher intended is now part of the trust boundary for every install.
This release lets Atmos use the same verification metadata already maintained by Aqua package definitions, reducing exposure to tampered archives, corrupted caches, and accidental asset mismatches.
Cached assets are no longer trusted blindly. If verification fails, Atmos rejects the cached asset and prevents extraction instead of installing a package that does not match the registry metadata.
How to Use It
The default configuration verifies available metadata without requiring every package to publish checksums or signatures:
toolchain:
verification:
checksums: when_available
signatures: when_available
verifier_install: auto
For stricter environments, require verification metadata:
toolchain:
verification:
checksums: required
signatures: required
Set verifier_install: path_only when CI images already provide cosign, slsa-verifier, gh, or minisign and Atmos should not install verifier CLIs automatically.
Get Involved
See the toolchain configuration reference for the verification policy settings and supported verifier commands.
