Personal opinion only: displaying checksums, even optionally, is
unlikely to be helpful. No one pays attention to these or verifies
them. Recently I actually went to the trouble of verifying the
checksums for a major Apache project and discovered the KEYS file was
borked. No one had noticed for years. Checksums need to be verified
automatically. Adding code to support manual verification is security
theater and a waste of time.



On Thu, Jul 10, 2025 at 6:18 PM Calum Harrison
<calum.harri...@snyk.io.invalid> wrote:
>
> Hi dev list,
>
> I'd like to propose a small enhancement to the maven-dependency-plugin.
> From a Software Composition Analysis (SCA) and security perspective, it's
> crucial to verify the exact artifact that has been resolved during a build.
> Private or third-party repositories may provide artifacts that have been
> patched or altered but retain the same GAV (GroupId, ArtifactId, Version)
> coordinates. This makes identifying the specific artifact provenance a
> challenge.
>
> Would the team consider adding an optional flag (e.g., -DshowChecksums) to
> commands like dependency:tree and dependency:list that would display the
> SHA-1 hash of the resolved artifact?
> This would provide a simple, standardized way to verify artifact integrity
> without relying on third-party plugins, which are often restricted in
> corporate environments.
>
> Is this functionality something that would be within the scope of the
> maven-dependency-plugin, or would it be better suited for another plugin or
> Maven core itself?
>
> Thanks,
> Calum



-- 
Elliotte Rusty Harold
elh...@ibiblio.org

---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@maven.apache.org
For additional commands, e-mail: dev-h...@maven.apache.org

Reply via email to