Cryptographic Registry Provenance: Structural Defense Against Dependency Confusion in AI Package Ecosystems
TLDR
This paper introduces a cryptographic system for registry provenance to structurally defend against dependency confusion attacks in software ecosystems.
Key contributions
- Introduces cryptographic registry identity with Ed25519 keypairs for artifact signing.
- Proposes a dual-signature model where publishers sign and registries countersign packages.
- Enables authoritative namespace binding by pinning registry fingerprints for cryptographic rejection.
- Extends provenance to AI-generated artifacts and integrates with runtime governance architectures.
Why it matters
Current dependency confusion defenses are configuration-based and prone to silent failure. This paper offers a robust, cryptographic system that structurally prevents these attacks by ensuring verifiable registry provenance. It's crucial for securing modern software supply chains, including emerging AI package ecosystems.
Original Abstract
Dependency confusion attacks exploit a structural gap in software distribution: once a package is installed, there is no cryptographic proof of which registry distributed it. Every existing defense is configuration-based and fails silently when misconfigured. We present a cryptographic distribution provenance system comprising three components: (1) cryptographic registry identity, where every registry holds an Ed25519 keypair and signs every artifact it distributes; (2) a dual-signature model, where the publisher signs at packaging time and the registry countersigns at publication time; and (3) authoritative namespace binding, where consumers pin registry fingerprints and the resolver cryptographically rejects artifacts from unauthorized registries. These create three defense layers requiring simultaneous compromise for a successful attack. A comparison across eight ecosystems (npm, Cargo, Hex.pm, PyPI, Go modules, Docker/OCI, NuGet, Maven) shows no existing ecosystem combines mandatory publisher signing, cryptographic registry identity, mandatory registry countersigning, and consumer-side cryptographic enforcement. The system extends to AI-generation provenance as a signed attribute and governance-enforced dependency resolution. A case study integrates distribution provenance with a three-layer runtime governance architecture, creating a four-phase lifecycle chain with no cryptographic gaps.
📬 Weekly AI Paper Digest
Get the top 10 AI/ML arXiv papers from the week — summarized, scored, and delivered to your inbox every Monday.