OCI Artifact Security
OCI artifacts extend the container registry model beyond images to store Helm charts, WASM modules, Cosign signatures, and SBOM attestations. As organizations adopt OCI registries as a universal artifact store, supply chain attacks targeting these non-image artifacts are rapidly increasing.
Beyond Container Images
The OCI Distribution Specification allows registries like Docker Hub, GitHub Container Registry, and AWS ECR to store arbitrary artifact types. Helm charts, Cosign signatures, Notation attestations, WASM binaries, and SBOMs are all stored as OCI artifacts. Each artifact type carries unique security risks — from unsigned Helm charts deploying privileged pods to WASM modules with memory-unsafe host function bindings.
Supply Chain Risks in OCI Artifacts
OCI artifacts are consumed by automation pipelines with minimal human review. A tampered Helm chart can deploy cryptominers alongside legitimate workloads. Unsigned WASM modules can execute arbitrary host calls. Malicious SBOM attestations can trick policy engines into approving vulnerable images. Without content-addressable verification (digest pinning), tag-based references are vulnerable to registry poisoning.
How Precogs AI Secures OCI Artifacts
Precogs AI inspects OCI artifacts stored in container registries — analyzing Helm chart templates for privilege escalation, scanning WASM binaries for memory corruption, verifying Cosign/Notation signature chains, and validating SBOM integrity. Our scanning covers the full OCI manifest, config, and layer blobs.
Attack Scenario: The Helm Chart Registry Poisoning
An organization stores all Helm charts as OCI artifacts in a private container registry.
An attacker compromises a CI/CD service account token with push access to the registry.
The attacker pushes a modified Helm chart to the same tag (e.g., v3.1.0) that adds a privileged init container running a cryptominer.
The GitOps controller (ArgoCD/Flux) detects the 'new' chart version and automatically deploys it to production.
The cryptominer runs as a privileged init container across 200 pods, consuming GPU resources and exfiltrating Kubernetes secrets.
Real-World Code Examples
Unsigned Helm Chart Deployment (CWE-345)
Helm charts stored as OCI artifacts can be silently replaced if the registry lacks immutable tags or access controls. Without cryptographic signature verification (Cosign, Notation), deployment pipelines blindly trust whatever artifact is stored at a given tag, enabling supply chain injection.
Detection & Prevention Checklist
- ✓Enforce Cosign or Notation signature verification on all OCI artifact pulls in CI/CD pipelines
- ✓Pin OCI artifact references by digest (sha256) rather than mutable tags
- ✓Enable registry immutable tags or content trust policies to prevent tag overwrites
- ✓Scan Helm chart templates for privileged containers, hostPath mounts, and excessive RBAC before deployment
- ✓Validate SBOM attestations against the actual image content to detect discrepancies
How Precogs AI Protects You
Precogs AI scans OCI artifacts in container registries — verifying signatures, analyzing Helm chart templates for misconfigurations, inspecting WASM binaries for memory corruption, and validating SBOM attestation integrity before artifacts reach your clusters.
Start Free ScanWhat are OCI artifacts and why are they a security risk?
OCI artifacts are non-image blobs (Helm charts, WASM modules, SBOMs, signatures) stored in container registries. They are consumed by automation pipelines and can introduce supply chain risks if unsigned, tampered, or maliciously crafted. Precogs AI validates their integrity and scans for embedded vulnerabilities.
Scan for OCI Artifact Security Issues
Precogs AI automatically detects oci artifact security vulnerabilities and generates AutoFix PRs.