
How I built forgeseal to solve JS/TS supply chain security in one command
The Problem The EU Cyber Resilience Act is approaching enforcement, and it requires SBOMs (Software Bills of Materials) for every software product. If you ship to Europe, this isn't optional. For JavaScript and TypeScript teams, the supply chain security toolchain is fragmented. You need separate tools for SBOM generation, artifact signing, provenance attestations, and vulnerability management. Each has its own configuration, its own assumptions about your setup, and most of them struggle with the variety of JS/TS lockfile formats (npm v2/v3, yarn classic, yarn berry v2/v3/v4, pnpm v6/v9, bun text and binary). I kept hitting this wall across projects, so I built forgeseal. What forgeseal Does forgeseal is a single Go binary that handles the entire supply chain security workflow: forgeseal pipeline --dir ./my-project --output-dir ./artifacts --vex-triage That one command: Detects and parses your lockfile (supports all six JS/TS formats) Generates a CycloneDX SBOM with proper PURLs, inte
Continue reading on Dev.to JavaScript
Opens in a new tab




