
Relying on more transparent & trustworthy sources for Arch Linux packages
The Linux packaging supply chain is composed of all elements (e.g. infrastructure, technical processes and individuals) involved in building and delivering packages to users.
A supply chain attack happens when one (or more) of the supply chain components is compromised.
Fortunately, mechanisms exist to prevent (or at least detect) such supply chain attacks…
…but monitoring & securing the entire supply chain remains challenging.

Despite the infected upstream package sources being locked behind checksums and cryptographically signed:
$ cat PKGBUILD
pkgname=xz
pkgver=5.6.1
pkgrel=1
pkgdesc='Library and command line tools for XZ and LZMA compressed files'
arch=('x86_64')
url='https://xz.tukaani.org/xz-utils/'
license=('GPL' 'LGPL' 'custom')
depends=('sh')
provides=('liblzma.so')
validpgpkeys=('3690C240CE51B4670D30AD1C38EE757D69184620' # Lasse Collin <lasse.collin@tukaani.org>
'22D465F2B4C173803B20C6DE59FCF207FEA7F445') # Jia Tan <jiat0218@gmail.com>
source=("https://github.com/tukaani-project/xz/releases/download/v${pkgver}/xz-${pkgver}.tar.gz"{,.sig})
sha256sums=('2398f4a8e53345325f44bdd9f0cc7401bd9025d736c6d43b372f4dea77bf75b8'
'SKIP')
sha512sums=('8af100eb83288f032e4813be2bf8de7d733c8761f77f078776c1391709241ad8fe3192d107664786e2543677915c5eeb3fe7add5c53b48b50c10a9de7c9f4fda'
'SKIP')
[...]
And despite the infected package being reproducible:
$ repro -dnf xz-5.6.1-1-x86_64.pkg.tar.zst
[...]
==> Leaving fakeroot environment.
==> Finished making: xz 5.6.1-1 (Mon Jan 5 14:09:54 2026)
==> Cleaning up...
-> Delete snapshot for xz_294294...
==> Comparing hashes...
==> Package is reproducible!

