Main

processing priority

3

site type

0 (generic, awaiting analysis)

review version

11

html import

20 (imported)

Events

first seen date

2024-01-10 11:29:46

expired found date

-

created at

2024-06-19 04:39:52

updated at

2026-01-04 18:07:00

Domain name statistics

length

8

crc

48643

tld

2265

nm parts

0

nm random digits

0

nm rare letters

0

Connections

is subdomain of id

-

previous id

0

replaced with id

0

related id

-

dns primary id

78735884

dns alternative id

0

lifecycle status

0 (unclassified, or currently active)

Subdomains and pages

deleted subdomains

0

page imported products

0

page imported random

0

page imported parking

0

Error counters

count skipped due to recent timeouts on the same server IP

0

count content received but rejected due to 11-799

0

count dns errors

0

count cert errors

0

count timeouts

0

count http 429

0

count http 404

0

count http 403

0

count http 5xx

0

next operation date

-

Server

server bits

server ip

-

Mainpage statistics

mp import status

20

mp rejected date

-

mp saved date

-

mp size orig

32981

mp size raw text

5294

mp inner links count

1

mp inner links status

20 (imported)

Open Graph

title

Supply-chain Levels for Software Artifacts

description

SLSA is a security framework. It is a check-list of standards and controls to prevent tampering, improve integrity, and secure packages and infrastructure in your projects, businesses or enterprises.

image

site name

SLSA

author

updated

2025-12-29 05:09:03

raw text

SLSA • Supply-chain Levels for Software Artifacts Your browser does not support the video tag. Safeguarding artifact integrity across any software supply chain What is SLSA? Supply-chain Levels for Software Artifacts, or SLSA ("salsa"). It’s a security framework, a checklist of standards and controls to prevent tampering, improve integrity, and secure packages and infrastructure. It’s how you get from "safe enough" to being as resilient as possible, at any link in the chain. The supply chain problem Any software can introduce vulnerabilities into a supply chain. As a system gets more complex, it’s critical to already have checks and best practices in place to guarantee artifact integrity, that the source code you’re relying on is the code you’re actually using. Without solid foundations and a plan for the system as it grows, it’s difficult to focus your efforts against tomorrow’s next hack, breach or compromise. More about supply chain attacks Levels of assuranc...

Text analysis

redirect type

0 (-)

block type

0 (no issues)

detected language

1 (English)

category id

Economy [en] (222)

index version

2025123101

spam phrases

0

Text statistics

text nonlatin

0

text cyrillic

0

text characters

4108

text words

779

text unique words

366

text lines

62

text sentences

36

text paragraphs

13

text words per sentence

21

text matched phrases

4

text matched dictionaries

3

RSS

rss path

rss status

1 (priority 1 already searched, no matches found)

rss found date

-

rss size orig

0

rss items

0

rss spam phrases

0

rss detected language

0 (awaiting analysis)

inbefore feed id

-

inbefore status

0 (new)

Sitemap

sitemap status

34 (reserved: import paused pending content quality/relevance assessment after importing first 500 pages)

sitemap review version

2

sitemap urls count

130

sitemap urls adult

0

sitemap filtered products

0

sitemap filtered videos

0

sitemap found date

2024-01-10 11:29:46

sitemap process date

2024-12-08 16:15:39

sitemap first import date

-

sitemap last import date

2026-01-04 18:07:00