Supply chain trust
Every@mnemom/* npm package is published with SLSA build provenance — a cryptographically signed attestation that binds each published tarball to the exact GitHub Actions workflow run that built it. This guarantees the package you install was built from the source code we published, on infrastructure we control, without a developer’s laptop or long-lived credential in the chain.
What provenance means
When you install a recent version of any@mnemom/* package, the tarball on the npm registry is accompanied by a SLSA provenance attestation (predicate type https://slsa.dev/provenance/v1). The attestation is:
- Signed via sigstore, using short-lived keys issued only to the specific GitHub Actions workflow run.
- Bound to the source — records the exact commit SHA, repository, and workflow path used to build the package.
- Transparent — published to the public sigstore transparency log; anyone can audit the full signing history.
Verifying a package
Quick check with npm
@mnemom/* package in your tree reports missing attestations or unverified, treat it as a supply-chain incident and contact security@mnemom.ai before using the installed code.
Inspecting provenance directly
SBOMs
Every release ships a CycloneDX software bill of materials (SBOM). You can find it in two places:- GitHub Release assets — for packages published via GitHub Releases (e.g.,
@mnemom/types), the SBOM is attached to the release itself. Example: mnemom/mnemom-types releases. - Workflow run artifacts — every publish workflow run uploads
sbom.cdx.jsonas an artifact, retained for 90 days.
Packages covered
All packages under the@mnemom/* scope on npm. A non-exhaustive list:
| Package | Repo |
|---|---|
@mnemom/agent-alignment-protocol | mnemom/aap |
@mnemom/agent-integrity-protocol | mnemom/aip |
@mnemom/aip-otel-exporter | mnemom/aip-otel-exporter |
@mnemom/policy-engine | mnemom/mnemom-platform |
@mnemom/mnemom (CLI) | mnemom/mnemom-platform |
@mnemom/types | mnemom/mnemom-types |