Security
Security
Quiver includes checksum verification for downloaded release assets, especially Nushell archives and plugin binaries.
Default behavior
The default policy is fail-closed:
- installs fail when checksum data is missing
- installs fail when checksum data cannot be parsed
- installs fail when the checksum does not match the downloaded asset
Quiver looks for checksum metadata in the same release, preferring:
SHA256SUMSchecksums.txt- a sidecar
<asset>.sha256file
Relevant flags
qv install --frozen
qv install --allow-unsigned
qv install --no-build-fallback--frozenenforces lockfile-only installs and does not allow insecure overrides--allow-unsigneddisables the signed-asset requirement for that install--no-build-fallbackdisables local cargo builds when no usable release asset is available
Plugin install path
For plugin dependencies, Quiver attempts installation in this order:
- Download a matching GitHub release asset for the current platform.
- Fall back to building from source with Cargo if allowed.
Building from source is a different trust boundary than consuming a verified release artifact. If you want the strictest CI behavior, use:
qv install --frozen --no-build-fallback