{"id":46153,"date":"2022-04-11T22:31:15","date_gmt":"2022-04-11T22:31:15","guid":{"rendered":"https:\/\/www.darkreading.com\/dr-tech\/google-github-collaboration-focuses-on-securing-code-build-processes"},"modified":"2022-04-11T22:31:15","modified_gmt":"2022-04-11T22:31:15","slug":"google-github-collaboration-focuses-on-securing-code-build-processes","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/google-github-collaboration-focuses-on-securing-code-build-processes\/","title":{"rendered":"Google, GitHub Collaboration Focuses on Securing Code Build Processes"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltdd31a2f7e25d2ffb\/620d5a627320a66823ef8fca\/SupplyChain-Panther_Media_GmbH-alamy.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Google and GitHub have been collaborating on a forgery-proof method for signing source code as part of their efforts to secure the software supply chain.<\/p>\n<p>Software supply chain security depends on developers and organizations being able to detect that artifacts \u2014 the software components, frameworks, and build tools being used \u2014 are authentic and have not been tampered with. That is the thinking behind <a href=\"https:\/\/security.googleblog.com\/2021\/06\/introducing-slsa-end-to-end-framework.html\">Supply chain Levels for Software Artifacts<\/a> (SLSA), a framework for maintaining end-to-end integrity of a software supply chain.<\/p>\n<p>SLSA&#8217;s goal is to generate information that described where, when, and how the artifacts were produced, and give developers and organizations a way to identify where the artifacts diverged from the original. The project, originally built by Google last June in response to National Institute of Standards and Technology&#8217;s (NIST) <a href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-218.pdf\" target=\"_blank\" rel=\"noopener\">framework for software development<\/a>, is managed by the <a href=\"https:\/\/github.com\/ossf\/wg-supply-chain-integrity\" target=\"_blank\" rel=\"noopener\">Open Source Security Foundation<\/a>.<\/p>\n<p>Knowing a project&#8217;s SLSA level can provide developers and organizations with some insights into the project&#8217;s security posture.<\/p>\n<p><strong>Looking at the Build Tools<\/strong><br \/>Google and GitHub&#8217;s recent collaboration focuses on <a href=\"https:\/\/security.googleblog.com\/2022\/04\/improving-software-supply-chain.html\" target=\"_blank\" rel=\"noopener\">build provenance<\/a>, or verifying the authenticity of the entity behind the release processes and whether the build artifacts are protected against tampering. As the <a href=\"https:\/\/www.darkreading.com\/risk\/5-key-takeaways-from-the-solarwinds-breach\" target=\"_blank\" rel=\"noopener\">attack against SolarWinds<\/a> and <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/attackers-compromised-code-checking-vendors-tool-for-two-months\/d\/d-id\/1340765?_mc=bibv\" target=\"_blank\" rel=\"noopener\">Codecov<\/a> showed, threat actors can hijack build tools to disseminate malicious components.<\/p>\n<p>&#8220;[These] attacks could have been prevented if there were a way to detect that the delivered artifacts diverged from the expected origin of the software,&#8221; writes Google Open Source Security Team&#8217;s Asra Ali and Laurent Simon.<\/p>\n<p>Google and GitHub announced a prototype tool, written in the Go programming language, that uses <a href=\"https:\/\/docs.github.com\/en\/actions\/using-workflows\" target=\"_blank\" rel=\"noopener\">GitHub Actions workflows<\/a> and <a href=\"https:\/\/www.sigstore.dev\/\" target=\"_blank\" rel=\"noopener\">Sigstore<\/a>&#8216;s signing tools to create &#8220;tamperless evidence of the build and allow consumer verification.&#8221;<\/p>\n<p>Using those workflows and tools allows &#8220;users to not only verify that the software they receive is authentic, but also to verify where it was built and with which software,&#8221; writes <a href=\"https:\/\/github.blog\/2022-04-07-slsa-3-compliance-with-github-actions\/\" target=\"_blank\" rel=\"noopener\">Jose Palafox<\/a>, GitHub&#8217;s director of business development.<\/p>\n<p>The new workflow, which is available in the Actions tab in any GitHub repository, creates runners, or fresh virtual machine instances, for each job. Different VMs compile the project and generate and sign the SLSA provenance. Projects using GitHub-hosted runners have the guarantee that the code has not been modified.<\/p>\n<p>&#8220;To protect against the possibility of one job (e.g. the build step) tampering with the other artifacts used by another job (the provenance step), this approach uses a trusted channel to protect the integrity of the data,&#8221; Ali and Simon write.<\/p>\n<p>A unique token contains verifiable information about the workflow such as the caller repository, commit hash, trigger, and current workflow path and reference. Users can rely on the signing certificates to verify provenance, and developer don&#8217;t need to manage or distribute cryptographic keys for signing.<\/p>\n<p><strong>GitOps in Security<\/strong><br \/>With cloud-native development, developers are working as quickly and efficiently as possible with their CI\/CD pipelines using Git repos, says Melinda Marks, a senior analyst with ESG. If security is to match the speed of modern software development, security tools need to be integrated into the developer workflow in order to reduce the risk of deploying faulty code. Google and GitHub&#8217;s collaboration &#8220;illustrate how GitOps is good for security,&#8221; Marks says.<\/p>\n<p>The use of GitHub Actions workflows to automatically generate build provenance and using Sigstore information to track the code is giving developers ways to create reusable trusted workflows, mechanisms to prevent tampering, and records when code is altered, Marks says. <\/p>\n<p>&#8220;These GitHub features and frameworks keep track of the code, where it&#8217;s from, who had access, what changes were made, etc., so if there are problems, they can use security tools, testing tools, configuration\/posture management tools, etc., and use the metadata from the repos to fix issues efficiently because they have the data on the code origin, any modifications, access, etc,&#8221; she says.<\/p>\n<p><strong>A Graduated Approach<\/strong><br \/>Recent high-profile breaches highlight how the software supply chain is vulnerable and what kind of damage attacks can cause. <a href=\"https:\/\/www.gartner.com\/en\/documents\/4003625\" target=\"_blank\" rel=\"noopener\">Gartner predicts<\/a> that &#8220;by 2025, 45% of organizations will have experienced attacks on their software supply chains, a threefold increase from 2021.&#8221;<\/p>\n<p>The SLSA framework recognizes that adopting supply chain security for software builds is not a quick process and that an <a href=\"https:\/\/slsa.dev\/spec\/v0.1\/levels\" target=\"_blank\" rel=\"noopener\">incremental approach is necessary<\/a>. The framework considers how provenance \u2014 metadata about how an artifact was built, including the build process, top-level source, and dependencies \u2014 is generated and verified. There are four levels:<\/p>\n<ul>\n<li>Level One: The build process must be fully scripted and\/or automated and generate provenance. This level doesn&#8217;t prevent tampering but offers information that can be used in vulnerability management.<\/li>\n<li>Level Two: The organization must be using version control and a hosted build service that generates authenticated provenance. This level prevents tampering to the extent that the build service is trusted.<\/li>\n<li>Level Three: The source and build platforms meet specific standards to guarantee the auditability of the source and the integrity of the provenance.<\/li>\n<li>Level Four: The organization requires a two-person review of all changes and a hermetic, reproducible build process. Hermetic builds guarantee the provenance&#8217;s list of dependencies is complete.<\/li>\n<\/ul>\n<p>The new build provenance prototype tool would bring organizations to Level Three under SLSA, Ali and Simon say. Projects using GitHub runners will be perceived as having authentic artifacts. Level Three requires some way to repeatedly verify the provenance, which this prototype provides.\n<\/p>\n<p>&#8220;Using this approach, projects building on GitHub runners can achieve <a href=\"https:\/\/slsa.dev\/spec\/v0.1\/requirements\" target=\"_blank\" rel=\"noopener\">SLSA 3<\/a> (the third of four progressive SLSA levels), which affirms to consumers that your artifacts are authentic and trustworthy,&#8221; Ali and Simon write.<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/dr-tech\/google-github-collaboration-focuses-on-securing-code-build-processes\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The software supply chain security tool from GitHub and Google uses GitHub Actions and Sigstore to generate a &#8220;tamper-proof&#8221; record describing where, when, and how the software is produced.Read More <a href=\"https:\/\/www.darkreading.com\/dr-tech\/google-github-collaboration-focuses-on-securing-code-build-processes\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-46153","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Google, GitHub Collaboration Focuses on Securing Code Build Processes 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/google-github-collaboration-focuses-on-securing-code-build-processes\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Google, GitHub Collaboration Focuses on Securing Code Build Processes 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/google-github-collaboration-focuses-on-securing-code-build-processes\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-11T22:31:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltdd31a2f7e25d2ffb\/620d5a627320a66823ef8fca\/SupplyChain-Panther_Media_GmbH-alamy.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-github-collaboration-focuses-on-securing-code-build-processes\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-github-collaboration-focuses-on-securing-code-build-processes\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Google, GitHub Collaboration Focuses on Securing Code Build Processes\",\"datePublished\":\"2022-04-11T22:31:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-github-collaboration-focuses-on-securing-code-build-processes\\\/\"},\"wordCount\":940,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-github-collaboration-focuses-on-securing-code-build-processes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltdd31a2f7e25d2ffb\\\/620d5a627320a66823ef8fca\\\/SupplyChain-Panther_Media_GmbH-alamy.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-github-collaboration-focuses-on-securing-code-build-processes\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-github-collaboration-focuses-on-securing-code-build-processes\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-github-collaboration-focuses-on-securing-code-build-processes\\\/\",\"name\":\"Google, GitHub Collaboration Focuses on Securing Code Build Processes 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-github-collaboration-focuses-on-securing-code-build-processes\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-github-collaboration-focuses-on-securing-code-build-processes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltdd31a2f7e25d2ffb\\\/620d5a627320a66823ef8fca\\\/SupplyChain-Panther_Media_GmbH-alamy.jpg\",\"datePublished\":\"2022-04-11T22:31:15+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-github-collaboration-focuses-on-securing-code-build-processes\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-github-collaboration-focuses-on-securing-code-build-processes\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-github-collaboration-focuses-on-securing-code-build-processes\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltdd31a2f7e25d2ffb\\\/620d5a627320a66823ef8fca\\\/SupplyChain-Panther_Media_GmbH-alamy.jpg\",\"contentUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltdd31a2f7e25d2ffb\\\/620d5a627320a66823ef8fca\\\/SupplyChain-Panther_Media_GmbH-alamy.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-github-collaboration-focuses-on-securing-code-build-processes\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Google, GitHub Collaboration Focuses on Securing Code Build Processes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Google, GitHub Collaboration Focuses on Securing Code Build Processes 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/google-github-collaboration-focuses-on-securing-code-build-processes\/","og_locale":"en_US","og_type":"article","og_title":"Google, GitHub Collaboration Focuses on Securing Code Build Processes 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/google-github-collaboration-focuses-on-securing-code-build-processes\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-04-11T22:31:15+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltdd31a2f7e25d2ffb\/620d5a627320a66823ef8fca\/SupplyChain-Panther_Media_GmbH-alamy.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/google-github-collaboration-focuses-on-securing-code-build-processes\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/google-github-collaboration-focuses-on-securing-code-build-processes\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Google, GitHub Collaboration Focuses on Securing Code Build Processes","datePublished":"2022-04-11T22:31:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/google-github-collaboration-focuses-on-securing-code-build-processes\/"},"wordCount":940,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/google-github-collaboration-focuses-on-securing-code-build-processes\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltdd31a2f7e25d2ffb\/620d5a627320a66823ef8fca\/SupplyChain-Panther_Media_GmbH-alamy.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/google-github-collaboration-focuses-on-securing-code-build-processes\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/google-github-collaboration-focuses-on-securing-code-build-processes\/","url":"https:\/\/www.threatshub.org\/blog\/google-github-collaboration-focuses-on-securing-code-build-processes\/","name":"Google, GitHub Collaboration Focuses on Securing Code Build Processes 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/google-github-collaboration-focuses-on-securing-code-build-processes\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/google-github-collaboration-focuses-on-securing-code-build-processes\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltdd31a2f7e25d2ffb\/620d5a627320a66823ef8fca\/SupplyChain-Panther_Media_GmbH-alamy.jpg","datePublished":"2022-04-11T22:31:15+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/google-github-collaboration-focuses-on-securing-code-build-processes\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/google-github-collaboration-focuses-on-securing-code-build-processes\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/google-github-collaboration-focuses-on-securing-code-build-processes\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltdd31a2f7e25d2ffb\/620d5a627320a66823ef8fca\/SupplyChain-Panther_Media_GmbH-alamy.jpg","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltdd31a2f7e25d2ffb\/620d5a627320a66823ef8fca\/SupplyChain-Panther_Media_GmbH-alamy.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/google-github-collaboration-focuses-on-securing-code-build-processes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Google, GitHub Collaboration Focuses on Securing Code Build Processes"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46153","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=46153"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46153\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=46153"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=46153"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=46153"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}