Stop hand-carrying flight changes into orbit.
Uplink sits between your CI/CD pipeline and the spacecraft, flatsat, EGSE, simulator, or virtual payload. It signs artifacts, enforces policy, records approval, and delivers with evidence attached.
Release capsule
flight-r14.2
One artifact package ready for controlled delivery.
Artifact
firmware.elf + params.tbl
Target
test.run.space via CFDP
Approval
Dual-person gate satisfied
Evidence
NIST / NASA export ready
$ brew install uplink
$ uplink sign firmware.elf
✓ Signed with Sigstore keyless
✓ Transparency log entry created
$ uplink check firmware.elf
✓ No critical CVEs
✓ All crypto CNSA 2.0 compliant
✓ Approval gate satisfied
$ uplink push firmware.elf --target test.run.space
One controlled release step between build and target.
Not a build system, not a mission ops tool. Uplink owns the release step: sign, check, approve, and deliver artifacts to spacecraft or test rigs.
Your CI/CD
Build artifact
Keep GitHub Actions, Buildkite, Jenkins, Bazel, make.
uplink
| sign | Sigstore keyless or own PKI |
| attest | in-toto provenance |
| check | CVE, license, crypto, custom |
| approve | Role-based or dual-person gates |
| push | TCP/TLS or CFDP delivery |
| log | Tamper-evident evidence trail |
Target + Ops
Spacecraft, flatsat, EGSE
Keep COSMOS, Yamcs, Major Tom, cFS, F Prime, or custom tooling.
Keep your stack
Ingests your build output, hands status back to your ops layer.
Control the last mile
One release gate instead of per-program scripts.
Bring evidence
Structured proof for auditors, not screenshots.
Every program rebuilds the same fragile release path.
- Manual signing keys sit on one laptop or in a shared secret store.
- Approvals happen in Slack, Jira, or spreadsheets with weak traceability.
- Delivery scripts prove a transfer happened, but not what checks passed first.
- CFDP, retries, and audit history become bespoke glue that nobody wants to own.
Signed artifacts, enforced gates, and one audit trail.
- Every artifact is signed with a verified identity.
- Policy checks block risky binaries before they reach the target.
- Approval records show who authorized the upload and when.
- Delivery is reliable and the evidence trail is tamper-evident.
Any artifact
Works with the files you already ship.
- ELF binaries, firmware blobs, tarballs
- Config files, sequences, parameter tables
- OCI images, Docker tarballs, Yocto images
- cFS app bundles, F Prime deployments
Any target
Ground first, space-ready when you need it.
- TCP/TLS for ground, flatsat, EGSE, simulators
- CFDP Class 1 and 2 for controlled file delivery
- SDLS and BPSec/DTN for link and bundle security
- Hosted test endpoint at
test.run.space
Space protocols and supply-chain controls in one path.
| Capability | Specification |
|---|---|
| File delivery | CCSDS 727.0-B-5 (CFDP) |
| Link security | CCSDS 355.0-B-2 (SDLS) |
| DTN security | RFC 9172 (BPSec) |
| Signing | Sigstore (Fulcio, Rekor, cosign) |
| Attestation | in-toto v1.0 / SLSA v1.1 |
| Update framework | TUF v1.0 |
| SBOM | SPDX 2.3 / CycloneDX 1.5 |
| Post-quantum | ML-KEM, ML-DSA (CNSA 2.0) |
Free CLI. Hosted services when you need them.
The CLI is free forever. Hosted signing, audit log, and managed delivery start at $1,500/month.