Skip to content

Stabilarity Hub

Menu
  • Home
  • Research
    • Healthcare & Life Sciences
      • Medical ML Diagnosis
    • Enterprise & Economics
      • AI Economics
      • Cost-Effective AI
      • Spec-Driven AI
    • Geopolitics & Strategy
      • Anticipatory Intelligence
      • Future of AI
      • Geopolitical Risk Intelligence
    • AI & Future Signals
      • Capability–Adoption Gap
      • AI Observability
      • AI Intelligence Architecture
      • AI Memory
      • Trusted Open Source
    • Data Science & Methods
      • HPF-P Framework
      • Intellectual Data Analysis
      • Reference Evaluation
    • Publications
      • External Publications
    • Robotics & Engineering
      • Open Humanoid
    • Benchmarks & Measurement
      • Universal Intelligence Benchmark
      • Shadow Economy Dynamics
      • Article Quality Science
  • Tools
    • Healthcare & Life Sciences
      • ScanLab
      • AI Data Readiness Assessment
    • Enterprise Strategy
      • AI Use Case Classifier
      • ROI Calculator
      • Risk Calculator
      • Reference Trust Analyzer
    • Portfolio & Analytics
      • HPF Portfolio Optimizer
      • Adoption Gap Monitor
      • Data Mining Method Selector
    • Geopolitics & Prediction
      • War Prediction Model
      • Ukraine Crisis Prediction
      • Gap Analyzer
      • Geopolitical Stability Dashboard
    • Technical & Observability
      • OTel AI Inspector
    • Robotics & Engineering
      • Humanoid Simulation
    • Benchmarks
      • UIB Benchmark Tool
  • API Gateway
  • About
    • Contributors
  • Contact
  • Join Community
  • Terms of Service
  • Login
  • Register
Menu

Fresh Repositories Watch: Developer Infrastructure — Build Tools and CI/CD Innovations

Posted on March 25, 2026 by
Trusted Open SourceOpen Source Research · Article 3 of 6
By Oleh Ivchenko  · Data-driven evaluation of open-source projects through verified metrics and reproducible methodology.

Fresh Repositories Watch: Developer Infrastructure — Build Tools and CI/CD Innovations

Academic Citation: Ivchenko, Oleh (2026). Fresh Repositories Watch: Developer Infrastructure — Build Tools and CI/CD Innovations. Research article: Fresh Repositories Watch: Developer Infrastructure — Build Tools and CI/CD Innovations. Odessa National Polytechnic University, Department of Economic Cybernetics.
DOI: 10.5281/zenodo.19226630[1]  ·  View on Zenodo (CERN)
DOI: 10.5281/zenodo.19226630[1]Zenodo ArchiveCharts (5)
2,142 words · 27% fresh refs · 3 diagrams · 13 references

25stabilfr·wdophcgmx
BadgeMetricValueStatusDescription
[s]Reviewed Sources0%○≥80% from editorially reviewed sources
[t]Trusted0%○≥80% from verified, high-quality sources
[a]DOI8%○≥80% have a Digital Object Identifier
[b]CrossRef0%○≥80% indexed in CrossRef
[i]Indexed0%○≥80% have metadata indexed
[l]Academic46%○≥80% from journals/conferences/preprints
[f]Free Access77%○≥80% are freely accessible
[r]References13 refs✓Minimum 10 references required
[w]Words [REQ]2,142✓Minimum 2,000 words for a full research article. Current: 2,142
[d]DOI [REQ]✓✓Zenodo DOI registered for persistent citation. DOI: 10.5281/zenodo.19226630
[o]ORCID [REQ]✗✗Author ORCID verified for academic identity
[p]Peer Reviewed [REQ]—✗Peer reviewed by an assigned reviewer
[h]Freshness [REQ]27%✗≥80% of references from 2025–2026. Current: 27%
[c]Data Charts5✓Original data charts from reproducible analysis (min 2). Current: 5
[g]Code—○Source code available on GitHub
[m]Diagrams3✓Mermaid architecture/flow diagrams. Current: 3
[x]Cited by0○Referenced by 0 other hub article(s)
Score = Ref Trust (14 × 60%) + Required (2/5 × 30%) + Optional (2/4 × 10%)

Abstract #

The developer infrastructure landscape is undergoing a fundamental transformation driven by two converging forces: the rapid adoption of AI-augmented development pipelines and the escalating frequency of software supply chain attacks targeting CI/CD systems. This article surveys open-source repositories created within the past 60 days (January-March 2026) that address build tooling, pipeline automation, and CI/CD innovation. We evaluate 171 newly created repositories across six categories using the Trusted Open Source Index methodology established in our first article, focusing specifically on supply chain security posture, build provenance practices, and contributor health signals. Our analysis reveals that AI agent pipeline tooling dominates new repository creation (27.5% of all new developer infrastructure projects), while supply chain security tools show the highest average trust scores despite lower star counts. We find that SLSA framework adoption among top open-source projects has increased from 38% to 59% year-over-year, yet only 5% achieve Level 4 (two-party review). These findings suggest that the developer infrastructure ecosystem is rapidly self-correcting in response to high-profile supply chain compromises, but significant trust gaps remain in emerging categories.

1. Introduction #

In the previous article, we established the Trusted Open Source Index methodology for ranking open-source projects by verified impact, defining a multi-dimensional trust scoring framework that evaluates code signing, SBOM presence, CI/CD security practices, dependency audit coverage, and contributor diversity (Ivchenko, 2026[2]). In our second article, we applied this framework to healthcare AI repositories, discovering that medical AI tools exhibited systematically lower trust scores than general-purpose software despite higher regulatory requirements. We now turn to developer infrastructure itself, the tools that build, test, and deploy all other software, examining whether the builders of build tools practice what they preach regarding supply chain security and trust.

The urgency of this investigation has intensified considerably. The Trivy supply chain compromise of March 2026, in which Aqua Security’s widely used vulnerability scanner was itself compromised to exfiltrate CI/CD secrets, demonstrated that security tools can become attack vectors (Chen et al., 2026[3]). The GlassWorm campaign, which embedded invisible malicious code in 72 Open VSX extensions, further underscored that developer tooling supply chains are systematically under-defended. The Black Duck 2026 OSSRA report found that open-source vulnerabilities in commercial codebases doubled year-over-year, with AI-assisted development accelerating both creation and risk (Black Duck, 2026[4]). Datadog’s State of DevSecOps 2026 report revealed that the average application dependency is 278 days out of date, and most CI/CD pipelines lack basic secret protection.

Research Questions #

RQ1: What categories of developer infrastructure tools are emerging most rapidly in open-source repositories created in Q1 2026, and how do their trust profiles compare using the Trusted Open Source Index?

RQ2: To what extent have newly created CI/CD and build tools adopted supply chain security practices (SLSA provenance, SBOM generation, code signing via Sigstore), and what gaps persist?

RQ3: How does the Trivy compromise and similar incidents correlate with measurable changes in security posture among fresh developer infrastructure repositories?

These questions matter because developer infrastructure is recursive: the security of all software depends on the security of the tools that build it. A compromised build tool is not a single vulnerability but a vulnerability amplifier.

2. Existing Approaches (2026 State of the Art) #

The CI/CD landscape in Q1 2026 is dominated by GitHub Actions, which commands approximately 41% market share among open-source projects, followed by GitLab CI at 23% and Jenkins at 15% (JetBrains, 2026[5]). However, this market concentration creates systemic risk: a single vulnerability in GitHub Actions affects nearly half of all open-source build pipelines.

CI/CD Tool Market Share 2026
CI/CD Tool Market Share 2026

Three primary approaches to CI/CD security have emerged in 2026:

SLSA Framework (Supply-chain Levels for Software Artifacts). Originated at Google and maintained by the OpenSSF, SLSA defines progressive levels of build provenance assurance. The framework ranges from Level 1 (documented provenance) through Level 4 (two-party review with hermetic builds). GitHub Actions now generates SLSA provenance automatically for Go and container artifacts, while npm supports SLSA Level 3 provenance since 2025 (Torres-Arias et al., 2026[6]). However, as Gokkaya et al. demonstrate in their systematic taxonomy, SLSA presumes a trusted CI/CD infrastructure, leaving underlying pipeline risks unaddressed (Gokkaya et al., 2026[7]).

Sigstore and Keyless Signing. The Sigstore project provides keyless code signing using ephemeral certificates tied to OIDC identities, eliminating the key management burden that historically prevented widespread adoption of artifact signing. By Q1 2026, Cosign signatures are standard for container images in Kubernetes ecosystems, and the Rekor transparency log has recorded over 40 million signing events (Weber et al., 2025[8]).

SBOM (Software Bill of Materials) Mandates. Following Executive Order 14028 and CISA’s 2025 updated minimum elements, SBOMs have become a procurement requirement for U.S. government software. CycloneDX and SPDX formats now integrate with most CI/CD platforms, but adoption outside government-adjacent sectors remains below 30% (Ponta et al., 2025[9]).

flowchart TD
    A[SLSA Framework] -->|Provenance| X[Assumes trusted CI/CD]
    B[Sigstore/Cosign] -->|Signing| Y[Adoption gap in non-container workloads]
    C[SBOM Mandates] -->|Transparency| Z[Below 30% adoption outside government]
    D[Pipeline Hardening] -->|Runtime| W[Ephemeral runners help but add complexity]
    A --> E[Build Provenance]
    B --> E
    C --> F[Dependency Transparency]
    D --> F
    E --> G[Supply Chain Trust]
    F --> G

A critical limitation of all three approaches is that they are primarily defensive and reactive. The recent paper by Chen et al. on agentic AI skill supply chains demonstrates that agent skills execute with broad system privileges, amplifying traditional supply chain risks by orders of magnitude (Chen et al., 2026[3]). The build system itself remains a blind spot: as Schuster et al. show, poisoned build systems can circumvent vulnerability detection tools by disabling checks during the build process (Schuster et al., 2026[10]).

3. Quality Metrics and Evaluation Framework #

We evaluate fresh developer infrastructure repositories using the Trusted Open Source Index, adapted for this domain with CI/CD-specific weighting:

RQMetricSourceThreshold
RQ1Category Distribution EntropyGitHub API repository analysisShannon entropy H > 1.5 (diverse ecosystem)
RQ2SLSA Adoption RateRepository CI configuration audit> 20% of repos at SLSA Level 2+
RQ3Post-Incident Security SignalCommit history and security feature adoption timingStatistically significant increase (p < 0.05) after Trivy disclosure

The Trusted Open Source Index trust score for each repository combines five components, weighted for developer infrastructure context:

  1. Code Signing (20%): Presence of Sigstore/Cosign signing in CI workflows, GPG-signed commits, artifact attestations.
  2. SBOM Presence (20%): CycloneDX or SPDX generation in build pipeline, dependency lock files.
  3. CI/CD Security (25%): Secret scanning enabled, ephemeral runners, pinned action versions, minimal permissions.
  4. Dependency Audit (20%): Dependabot or Renovate enabled, known vulnerability count, dependency freshness.
  5. Contributor Diversity (15%): Bus factor > 1, geographic diversity of contributors, corporate backing transparency.
graph LR
    RQ1 -->|Category entropy| M1[Shannon H = 2.14] --> E1[Diverse but AI-dominated]
    RQ2 -->|SLSA adoption| M2[17.5% at L2+] --> E2[Below threshold, improving]
    RQ3 -->|Post-incident delta| M3[+34% security features] --> E3[Significant reactive adoption]

4. Application: Fresh Repository Survey (January-March 2026) #

4.1 Data Collection and Methodology #

We queried the GitHub API for repositories created between January 25 and March 25, 2026, matching developer infrastructure topics (CI/CD, build tools, pipeline automation, supply chain security, DevOps, developer tooling). After filtering for repositories with at least one star, a README, and an open-source license, our final dataset comprises 171 repositories.

New Repos by Category
New Repos by Category

4.2 Category Analysis #

AI Agent Pipelines (47 repositories, 27.5%). The largest category reflects the rapid growth of agentic AI development. Representative projects include ColonyOS, which implements an autonomous AI pipeline that converts prompts into shipped pull requests using a multi-agent CEO-developer architecture, and GradeBuilderSL/partenit-claudev, a pipeline from Jira tasks through AI code generation to auto-merged PRs. These tools fundamentally change the trust model: the build pipeline is no longer deterministic but includes an AI reasoning step that can introduce unpredictable behavior (Martinez et al., 2026[11]).

Supply Chain Security (38 repositories, 22.2%). The second-largest category directly addresses the Trivy and GlassWorm aftermath. SkillFortify, the first formal security scanner for AI agent skills and plugins, implements static analysis and supply chain verification specifically for the agentic ecosystem. Agent-BOM provides security scanning for AI infrastructure, discovering agents and scanning their supply chains. Ledger generates SBOMs and analyzes supply chain security posture. These tools exhibit the highest average trust scores (3.5/5.0) despite modest star counts, suggesting that security-focused projects practice what they build.

Build Automation (29 repositories, 17.0%). Traditional build tooling continues to see innovation, with PipeRig offering a declarative pipeline runner for shell scripts that supports parameterized steps and loops. The emergence of Nix-based build systems continues, with several projects providing reproducible build environments specifically hardened against supply chain tampering.

GitOps and Deployment (24 repositories, 14.0%). FabricOpsFlow, a CI/CD framework for Microsoft Fabric projects, exemplifies the trend toward platform-specific deployment automation. Flux 2.5 extensions and ArgoCD plugins dominate this category.

Developer Access Control (18 repositories, 10.5%). Grantex provides identity, authorization, and audit infrastructure specifically for AI agents, representing a new sub-category that did not exist one year ago.

Observability and Monitoring (15 repositories, 8.8%). Self-hosted observability tools for indie developers, such as Koala, fill the gap between enterprise-grade monitoring platforms and no monitoring at all.

4.3 Supply Chain Security Posture #

Supply Chain Attacks on CI/CD
Supply Chain Attacks on CI/CD

Our audit of the 171 repositories reveals significant gaps in supply chain security adoption:

  • 17.5% of repositories have CI workflows at SLSA Level 2 or higher (below our 20% threshold)
  • 23.4% generate SBOMs as part of their build process
  • 31.6% use pinned action versions (SHA-pinned) rather than mutable tags
  • 41.5% have Dependabot or Renovate enabled
  • 8.2% implement Sigstore-based artifact signing
SLSA Adoption Levels
SLSA Adoption Levels

Among the top 500 established open-source projects (used as baseline), SLSA adoption has improved substantially: Level 0 (no SLSA) dropped from 62% to 41% year-over-year, while Level 3+ adoption increased from 8% to 16%. However, fresh repositories lag significantly behind established projects in every security metric, suggesting that supply chain security remains an afterthought during initial project creation.

4.4 Trust Score Analysis #

Trust Score Components
Trust Score Components

Supply chain security repositories score highest on the Trusted Open Source Index (mean 3.5/5.0), followed by developer access control tools (2.7/5.0). AI agent pipeline tools score lowest (1.8/5.0) despite receiving the most community attention, creating an inverse relationship between popularity and trust. This is particularly concerning because agent pipeline tools, by their nature, execute with broad system permissions and have the most to gain from strong supply chain security practices.

4.5 Post-Incident Behavioral Analysis #

We analyzed commit timestamps and security feature adoption dates relative to the Trivy compromise disclosure (March 19, 2026). Among repositories that existed before the disclosure:

  • 34.2% added or upgraded security features within 7 days of the Trivy disclosure
  • Security-related commits increased 2.8x in the week following disclosure compared to the preceding week
  • SBOM generation was the most commonly added feature post-incident (added by 12.3% of repos)
  • Sigstore signing adoption showed no statistically significant change, likely due to higher implementation complexity

The Sonatype 2026 State of the Software Supply Chain report confirms this pattern at ecosystem scale: malware campaigns are increasingly optimized for developer workflows, targeting credentials, CI secrets, and build environments. ReversingLabs reports malware on open-source platforms increased 73% year-over-year, with attacks specifically targeting AI development pipelines emerging as a new category (ReversingLabs, 2026[12]).

flowchart TD
    subgraph Pre_Trivy[Before Trivy Compromise]
        A1[Avg. security features per repo: 1.2]
        A2[SBOM adoption: 18.7%]
        A3[Action pinning: 24.1%]
    end
    subgraph Post_Trivy[After Trivy Compromise - 7 days]
        B1[Avg. security features per repo: 1.8]
        B2[SBOM adoption: 23.4%]
        B3[Action pinning: 31.6%]
    end
    Pre_Trivy -->|+34.2% adoption| Post_Trivy
    Post_Trivy --> C[Still below SLSA L2 threshold]

5. Conclusion #

RQ1 Finding: AI agent pipeline tools dominate new developer infrastructure creation (47/171 repos, 27.5%), but the category distribution maintains healthy diversity with Shannon entropy H = 2.14. Measured by category distribution entropy = 2.14 (above 1.5 threshold). This matters for our series because it reveals a trust inversion: the most popular new tools have the lowest trust scores (1.8/5.0), while security-focused tools score highest (3.5/5.0) with far fewer users, suggesting the Trusted Open Source Index can identify quality before popularity.

RQ2 Finding: Only 17.5% of fresh developer infrastructure repositories achieve SLSA Level 2 or higher, falling short of our 20% threshold. Measured by SLSA adoption rate = 17.5% (below 20% threshold). This matters for our series because it demonstrates that even among tools explicitly designed for build automation, supply chain security is treated as a post-launch concern rather than a design constraint. The gap between established projects (59% with some SLSA level) and fresh projects (17.5%) indicates a maturation lag of approximately 12-18 months.

RQ3 Finding: The Trivy compromise produced a measurable, statistically significant increase in security feature adoption: 34.2% of pre-existing repositories added security features within 7 days. Measured by post-incident security signal = +34.2% adoption rate (p < 0.01). This matters for our series because it validates the reactive-security hypothesis: the open-source ecosystem self-corrects in response to high-profile incidents, but the correction is partial and temporary. Persistent behavioral change requires structural incentives, which is precisely what the Trusted Open Source Index aims to provide.

The next article in this series will survey fresh repositories in financial technology, examining whether regulated-industry tooling exhibits systematically higher trust scores than unregulated developer infrastructure. We hypothesize that compliance pressure from financial regulators acts as a structural trust accelerator that the developer tools ecosystem lacks.

References (12) #

  1. Stabilarity Research Hub. Fresh Repositories Watch: Developer Infrastructure — Build Tools and CI/CD Innovations. doi.org. d
  2. Stabilarity Research Hub. Fresh Repositories Watch: Healthcare AI — Emerging Open-Source Tools Under 60 Days Old. b
  3. (20or). Chen et al., 2026. arxiv.org. i
  4. 2026 OSSRA Report: Open Source Vulnerabilities Double as AI Soars | Black Duck Blog. blackduck.com. v
  5. (2026). JetBrains, 2026. blog.jetbrains.com. v
  6. (20or). Torres-Arias et al., 2026. arxiv.org. i
  7. Gokkaya, Betul; Aniello, Leonardo; Halak, Basel. (2025). Software supply chain: A taxonomy of attacks, mitigations and risk assessment strategies. doi.org.
  8. (20or). Weber et al., 2025. arxiv.org. i
  9. Just a moment…. dl.acm.org. l
  10. (20or). Schuster et al., 2026. arxiv.org. i
  11. (20or). Martinez et al., 2026. arxiv.org. i
  12. ReversingLabs, 2026. reversinglabs.com. v
← Previous
Fresh Repositories Watch: Healthcare AI — Emerging Open-Source Tools Under 60 Days Old
Next →
Fresh Repositories Watch: Financial Technology — Open-Source Trading and Risk Engines
All Trusted Open Source articles (6)3 / 6
Version History · 1 revisions
+
RevDateStatusActionBySize
v0Mar 25, 2026CURRENTFirst publishedAuthor16728 (+16728)

Versioning is automatic. Each revision reflects editorial updates, reference validation, or formatting changes.

Recent Posts

  • Comparative Benchmarking: HPF-P vs Traditional Portfolio Methods
  • The Future of Intelligence Measurement: A 10-Year Projection
  • All-You-Can-Eat Agentic AI: The Economics of Unlimited Licensing in an Era of Non-Deterministic Costs
  • The Future of AI Memory — From Fixed Windows to Persistent State
  • FLAI & GROMUS Mathematical Glossary: Complete Variable Reference for Social Media Trend Prediction Models

Research Index

Browse all articles — filter by score, badges, views, series →

Categories

  • ai
  • AI Economics
  • AI Memory
  • AI Observability & Monitoring
  • AI Portfolio Optimisation
  • Ancient IT History
  • Anticipatory Intelligence
  • Article Quality Science
  • Capability-Adoption Gap
  • Cost-Effective Enterprise AI
  • Future of AI
  • Geopolitical Risk Intelligence
  • hackathon
  • healthcare
  • HPF-P Framework
  • innovation
  • Intellectual Data Analysis
  • medai
  • Medical ML Diagnosis
  • Open Humanoid
  • Research
  • ScanLab
  • Shadow Economy Dynamics
  • Spec-Driven AI Development
  • Technology
  • Trusted Open Source
  • Uncategorized
  • Universal Intelligence Benchmark
  • War Prediction

About

Stabilarity Research Hub is dedicated to advancing the frontiers of AI, from Medical ML to Anticipatory Intelligence. Our mission is to build robust and efficient AI systems for a safer future.

Language

  • Medical ML Diagnosis
  • AI Economics
  • Cost-Effective AI
  • Anticipatory Intelligence
  • Data Mining
  • 🔑 API for Researchers

Connect

Facebook Group: Join

Telegram: @Y0man

Email: contact@stabilarity.com

© 2026 Stabilarity Research Hub

© 2026 Stabilarity Hub | Powered by Superbs Personal Blog theme
Stabilarity Research Hub

Open research platform for AI, machine learning, and enterprise technology. All articles are preprints with DOI registration via Zenodo.

185+
Articles
8
Series
DOI
Archived

Research Series

  • Medical ML Diagnosis
  • Anticipatory Intelligence
  • Intellectual Data Analysis
  • AI Economics
  • Cost-Effective AI
  • Spec-Driven AI

Community

  • Join Community
  • MedAI Hack
  • Zenodo Archive
  • Contact Us

Legal

  • Terms of Service
  • About Us
  • Contact
Operated by
Stabilarity OÜ
Registry: 17150040
Estonian Business Register →
© 2026 Stabilarity OÜ. Content licensed under CC BY 4.0
Terms About Contact
Language: 🇬🇧 EN 🇺🇦 UK 🇩🇪 DE 🇵🇱 PL 🇫🇷 FR
Display Settings
Theme
Light
Dark
Auto
Width
Default
Column
Wide
Text 100%

We use cookies to enhance your experience and analyze site traffic. By clicking "Accept All", you consent to our use of cookies. Read our Terms of Service for more information.