Show HN: SEL Deploy – Tamper-evident deployment timeline (Ed25519, hash-chained)

  • Posted 4 hours ago by chokriabouzid
  • 1 points
Every post-mortem starts with: "What exactly deployed before the incident?"

SEL Deploy records every deployment as a cryptographically-signed attestation, chained to the previous one. Modify any record — the chain breaks instantly.

Demo: https://asciinema.org/a/LDZVa0z3OVdLt7Zv

$ sel-deploy run -- kubectl apply -f deploy.yaml Hash: sel:v1.0:sha256:3541d13b... Chained to: sel:v1.0:sha256:1a2b3c4d...

$ sel-deploy verify Chain intact

# (modify one byte manually)

$ sel-deploy verify Hash mismatch — attestation tampered Chain broken

Built on SEL Core (deterministic engine, 33/33 tests). MIT licensed. No SaaS. Fully local.

GitHub: https://github.com/chokriabouzid-star/sel-deploy

0 comments