docs/documentation/platform/pki/concepts/code-signing.mdx
Code signing is the process of applying a digital signature to software artifacts — executables, libraries, firmware, container images, or packages — using a cryptographic key pair bound to a certificate. The signature lets consumers verify that the artifact was produced by a trusted publisher and has not been tampered with since it was signed.
When a user or system validates a signed artifact, it checks that the signature matches the artifact's contents and that the signing certificate chains back to a trusted Certificate Authority (CA). If either check fails, the artifact is flagged as untrusted.
Without code signing, there is no cryptographic proof that a piece of software is authentic. Attackers can modify binaries, inject malware into packages, or impersonate legitimate publishers. Code signing addresses these risks by providing:
Infisical provides a managed code signing workflow built on top of its PKI infrastructure:
codeSigning extended key usage. Private keys never leave Infisical; signing operations happen server-side.Every signing operation, whether it succeeds, fails, or is denied, is recorded as an immutable audit trail.