Research Log // 001 — The Integrity Series

Why Your SBOM Isn't Enough:
The "Clean Kitchen" Problem

January 29, 2026 · 6 min read · Supply Chain Security

In the wake of Executive Order 14028, the Software Bill of Materials (SBOM) became the industry's silver bullet. The logic was simple: if we know every ingredient in the software, we can identify every vulnerability.

But there is a fatal flaw in this logic.

An SBOM is a list of ingredients. It tells you that your software contains Log4j, a specific version of React, or a Go module. What it cannot tell you is if the kitchen where that software was cooked was compromised.

The Illusion of Security in Modern Pipelines

Standard security practices have historically focused on Static (SCA) and Dynamic (DAST) analysis of code. However, the rise of sophisticated attacks—such as the SolarWinds and Codecov breaches—demonstrates that an attacker does not need to compromise your source code to compromise your software. They only need to compromise the environment that compiles it.

Modern CI/CD workflows, specifically those relying on ephemeral GitHub Actions runners or shared GitLab executors, introduce a series of unverified variables:

The Transparency Gap

If an attacker compromises your CI/CD runner—the "kitchen"—they don't need to touch your source code. They can inject malicious binaries during the build process, steal OIDC tokens to escalate privileges, or modify the final artifact after the security scans have already passed.

Your SBOM will still look perfect. Your vulnerability scanner will show all green. Yet, your software is a Trojan horse.

84% of organizations use an SBOM, yet supply chain attacks are up 300%. We are verifying the code, but trusting the pipeline blindly.

From "Trust Me" to "Prove It"

The industry is currently suffering from a Chain-of-Custody crisis. An SBOM tells you the ingredients, but it doesn't tell you if the chef was compromised or if the kitchen was clean. To achieve true software sovereignty, organizations must move toward a model of verifiable integrity.

This requires a shift in the mental model of engineering enablement:

Introducing the PBOM

At Build Flow Labs, we argue that visibility without integrity is an illusion. To secure the modern supply chain, we must move beyond the "What" (SBOM) and start documenting the "How."

The PBOM (Pipeline Bill of Materials) provides cryptographic proof of the build's lifecycle:

By shifting from reactive vulnerability scanning to proactive Pipeline Integrity, organizations can reclaim sovereignty over their software supply chains. Every line of code becomes not only secure but also verifiable from origin to deployment.

What Comes Next

In the next installment of The Integrity Series, we'll define the PBOM framework in detail—including the technical schema, the cryptographic mechanisms, and a reference implementation using BuildGuard and Sigstore.

It's time to stop just reading the label and start verifying the process.

Ready to Verify Your Pipeline?

Build Flow Labs provides the frameworks and advisory to move your organization from "implicit trust" to "verified integrity."

Book Advisory