The artifact policy engine for
dist/andrelease/outputs.
ReleaseGuard is an open-source artifact security engine. It scans build outputs for risky content, applies deterministic hardening transforms, generates full SBOMs, signs and attests the final artifacts, and validates them against release policies — locally or in any CI/CD pipeline.
Most supply-chain security tools focus on source code, dependencies, containers, or runtime admission. ReleaseGuard focuses on the final distributable — the exact artifact that leaves your build system.
That means catching things that slip through everything else:
- Secret keys and API tokens embedded in
dist/bundles - Source maps accidentally shipped to production
- Debug symbols inside release binaries
.envfiles and internal hostnames baked into builds- Unsigned executables in packaged releases
# Install (macOS / Linux)
curl -sSfL https://raw.githubusercontent.com/Helixar-AI/ReleaseGuard/main/scripts/install.sh | sh
# Or build from source
git clone https://github.com/Helixar-AI/ReleaseGuard
cd ReleaseGuard && make install
# Bootstrap config
releaseguard init
# Scan your dist folder
releaseguard check ./dist
# Apply safe hardening transforms
releaseguard fix ./dist
# Generate SBOM
releaseguard sbom ./dist
# Full hardening pipeline
releaseguard harden ./dist| Command | Description |
|---|---|
releaseguard init |
Bootstrap .releaseguard.yml |
releaseguard check <path> |
Scan artifact and evaluate policy |
releaseguard fix <path> |
Apply safe deterministic transforms |
releaseguard sbom <path> |
Generate Software Bill of Materials |
releaseguard obfuscate <path> |
Apply obfuscation suite |
releaseguard harden <path> |
Full: fix + obfuscate + DRM injection |
releaseguard pack <path> |
Package into canonical archive |
releaseguard sign <artifact> |
Sign artifact and evidence bundle |
releaseguard attest <artifact> |
Emit in-toto / SLSA attestations |
releaseguard verify <artifact> |
Verify signatures and policy |
releaseguard report <path> |
Export report (JSON, SARIF, HTML) |
releaseguard vex <path> |
Enrich SBOM with VEX data |
- Secrets detection (API keys, private keys, tokens,
.envfiles) - Metadata leaks (source maps, debug symbols, build paths, internal URLs)
- Unexpected content (test files,
.gitremnants, CI configs) - License and notice presence checker
- All major ecosystems: Node.js, Python, Go, Rust, Java, .NET, Ruby, PHP, Container, System packages
- Formats: CycloneDX (JSON + XML), SPDX (JSON + tag-value)
- VEX enrichment via OSV.dev
- Remove source maps, strip debug info, delete forbidden files
- Normalize archive timestamps for reproducibility
- Add checksums and manifest
- JS: string encryption, property mangling
- Go: symbol stripping, build path redaction, garble integration
- Python:
.pysource removal, PyArmor integration - JVM / .NET: symbol renaming, PDB stripping
- Native (ELF / Mach-O / PE): debug section and symbol stripping
- Runtime integrity check stub injection (JS, Go, .NET, Python)
- Tamper detection with configurable
exitorlogaction - Anti-debug stubs (opt-in)
- Keyless signing via Sigstore / Fulcio
- Local key signing (GPG, ECDSA)
- in-toto attestation statements
- SLSA Provenance level 2
- Built-in YAML rules (severity gates, category gates, license checks)
- Open Policy Agent (Rego) adapter
- Policy bundle loading from local path or OCI registry
- CLI table, JSON, SARIF (GitHub Security tab), Markdown, HTML
🔒 Advanced capabilities available in ReleaseGuard Cloud.
- Obfuscation
medium/aggressive— control flow flattening, opaque predicates, LLVM passes - License enforcement server — online, offline, time-bound, machine-fingerprinted
- Managed DRM profiles per language and ecosystem
- Managed decompilation resistance profiles
- SLSA Provenance level 3 (hosted builder)
- KMS signing (AWS, GCP, Azure, HashiCorp Vault)
- Org-wide policy registry with inheritance
- Waiver and release approval workflows
- Historical evidence store and cross-repo dashboards
- SBOM registry with diff, CVE search, and vendor submission
- SSO (SAML / OIDC), compliance reports (SOC 2, ISO 27001, NTIA)
Show that your release is clean:
[\](https://github.com/Helixar-AI/ReleaseGuard)Renders as: [!ReleaseGuard](https://github.com/Helixar-AI/ReleaseGuard)
Always pin to a commit SHA — mutable tags can be moved. Replace
<SHA>with the SHA of the release you want, e.g.229a90dff5a31d7805e5df43bb9230f9fe5ec75cfor v0.1.2.
- uses: Helixar-AI/ReleaseGuard@<SHA> # vX.Y.Z
with:
path: ./dist
sbom: true
fix: true
sign: keyless
format: sarifCLI flags reference (for direct use of the releaseguard binary):
| Command | Key flags |
|---|---|
releaseguard check <path> |
--format <cli|json|sarif|markdown|html>, --out <file>, --config <file> |
releaseguard sbom <path> |
--format <cyclonedx|spdx>, --out <file>, --enrich-cve |
releaseguard fix <path> |
--dry-run |
releaseguard obfuscate <path> |
--level <none|light|medium|aggressive> |
releaseguard sign <artifact> |
--mode <keyless|local>, --key <file> |
Note:
--fail-onis not a CLI flag. Severity gating (which findings fail the build) is configured in.releaseguard.ymlunderpolicy.fail-on. Thefail-oninput on the GitHub Action is documentation-only and does not pass any flag to the CLI.
Install the ReleaseGuard skill from ClawHub:
clawhub install releaseguardThen just ask your agent in plain English:
"Scan my ./dist folder for secrets and misconfigs" "Generate an SBOM for this release" "Sign the artifact and attest provenance" "Run the full hardening pipeline on ./dist"
The skill maps natural language to the full releaseguard CLI — check, fix, sbom, sign, attest, verify, report, and vex — and installs the binary automatically if it isn't present.
Publish your own skill — the source is at skills/releaseguard/SKILL.md.
# .releaseguard.yml
version: 2
project:
name: my-app
scanning:
secrets:
enabled: true
metadata:
enabled: true
fail_on_source_maps: true
transforms:
remove_source_maps: true
add_checksums: true
policy:
fail_on:
- severity: critical
- category: secretSee docs/config-schema.md for the full schema reference.
git clone https://github.com/Helixar-AI/ReleaseGuard
cd ReleaseGuard
make dev-setup
make test
make buildIssues and PRs are welcome. See CONTRIBUTING.md.
MIT — see LICENSE.
Built by Helixar AI · ReleaseGuard Cloud →
