Release gateway for space software

Stop hand-carrying flight changes into orbit.

Uplink sits between your CI/CD pipeline and the spacecraft, flatsat, EGSE, simulator, or virtual payload. It signs artifacts, enforces policy, records approval, and delivers with evidence attached.

Any file in CI unchanged Mission ops unchanged Evidence attached

Release capsule

flight-r14.2

One artifact package ready for controlled delivery.

Ready to push

Artifact

firmware.elf + params.tbl

Target

test.run.space via CFDP

Approval

Dual-person gate satisfied

Evidence

NIST / NASA export ready

uplink sign Fulcio cert issued
uplink check 14 policy rules passed
uplink approve 2 identities recorded
uplink push CFDP session staged
mission release
$ brew install uplink
$ uplink sign firmware.elf
 Signed with Sigstore keyless
 Transparency log entry created

$ uplink check firmware.elf
 No critical CVEs
 All crypto CNSA 2.0 compliant
 Approval gate satisfied

$ uplink push firmware.elf --target test.run.space
What it is

One controlled release step between build and target.

Not a build system, not a mission ops tool. Uplink owns the release step: sign, check, approve, and deliver artifacts to spacecraft or test rigs.

Your CI/CD

Build artifact

Keep GitHub Actions, Buildkite, Jenkins, Bazel, make.

uplink

signSigstore keyless or own PKI
attestin-toto provenance
checkCVE, license, crypto, custom
approveRole-based or dual-person gates
pushTCP/TLS or CFDP delivery
logTamper-evident evidence trail

Target + Ops

Spacecraft, flatsat, EGSE

Keep COSMOS, Yamcs, Major Tom, cFS, F Prime, or custom tooling.

Keep your stack

Ingests your build output, hands status back to your ops layer.

Control the last mile

One release gate instead of per-program scripts.

Bring evidence

Structured proof for auditors, not screenshots.

Without Uplink

Every program rebuilds the same fragile release path.

  • Manual signing keys sit on one laptop or in a shared secret store.
  • Approvals happen in Slack, Jira, or spreadsheets with weak traceability.
  • Delivery scripts prove a transfer happened, but not what checks passed first.
  • CFDP, retries, and audit history become bespoke glue that nobody wants to own.
With Uplink

Signed artifacts, enforced gates, and one audit trail.

  • Every artifact is signed with a verified identity.
  • Policy checks block risky binaries before they reach the target.
  • Approval records show who authorized the upload and when.
  • Delivery is reliable and the evidence trail is tamper-evident.

Any artifact

Works with the files you already ship.

  • ELF binaries, firmware blobs, tarballs
  • Config files, sequences, parameter tables
  • OCI images, Docker tarballs, Yocto images
  • cFS app bundles, F Prime deployments

Any target

Ground first, space-ready when you need it.

  • TCP/TLS for ground, flatsat, EGSE, simulators
  • CFDP Class 1 and 2 for controlled file delivery
  • SDLS and BPSec/DTN for link and bundle security
  • Hosted test endpoint at test.run.space
Standards

Space protocols and supply-chain controls in one path.

Capability Specification
File deliveryCCSDS 727.0-B-5 (CFDP)
Link securityCCSDS 355.0-B-2 (SDLS)
DTN securityRFC 9172 (BPSec)
SigningSigstore (Fulcio, Rekor, cosign)
Attestationin-toto v1.0 / SLSA v1.1
Update frameworkTUF v1.0
SBOMSPDX 2.3 / CycloneDX 1.5
Post-quantumML-KEM, ML-DSA (CNSA 2.0)
Pricing

Free CLI. Hosted services when you need them.

The CLI is free forever. Hosted signing, audit log, and managed delivery start at $1,500/month.

Try it in five minutes.

Install the CLI, sign an artifact, run checks, and push to the test endpoint.

Read the docs