Prerequisites
- Install Kosli CLI.
- Get a Kosli API token.
- A Kosli flow and trail to attest to — follow the Getting started guide if you need one.
- A report file to attest (e.g. an SBOM in JSON format, or a SARIF vulnerability report).
Step 1: Create a summary attestation type
Define a custom attestation type that captures the key facts from your report. In this example we use a vulnerability report distilled into a summary JSON file:attestation-type vulnerability-summary was created.
You can verify it with:
Step 2: Distill your report into a summary
Usejq (or any other tool) to extract the fields you care about from your full report and write them to a summary file.
For example, if your tool produces a SARIF file, you might count findings by severity and write the result to vuln-summary.json.
The exact transformation will depend on your tool’s output format. The goal is a small JSON object that your attestation type’s rules can evaluate.
Step 3: Attest the summary and attach the full report
Use--attachments to upload the full report to the Evidence Vault alongside the summary attestation:
- Evaluate the jq rule against
vuln-summary.jsonto determine compliance. - Store
full-report.sarifin the Evidence Vault, linked to this attestation.
Step 4: Verify the attestation
What you’ve accomplished
You have attested a security report to Kosli using a lightweight summary for compliance evaluation, with the full document preserved in the Evidence Vault for audit purposes. From here you can:- Read the
kosli create attestation-typereference for all available options. - Read the
kosli attest customreference for attesting to artifacts. - Review naming conventions for attestation types.