Skip to Main Content
Taming the Wild West of ML: Practical Model Signing with Sigstore
["How can teachers and students use AI?", "What are the newest features in Chrome?", "How can I learn new AI skills?"]

Open Source Security

Taming the Wild West of ML: Practical Model Signing with Sigstore



The three steps involved in building an application that uses large language models.

The diagram illustrates a typical AI supply chain, showing how a model passes through different hands and levels of specialization before reaching the production stage.

The supply chain diagram for building a single model, illustrating some supply chain risks (oval labels) and where model signing can defend against them (check marks)

It is a cybersecurity risk map designed to help developers and security engineers identify where to protect their AI systems against external manipulation.