v0.18.1. Before installing, you can cryptographically confirm that the package you downloaded was built by SuprSend and has not been modified in transit.
Before you begin
The SuprSend Python SDK ships with two independent trust signals:- PyPI Verified details badge — visible on the PyPI project page sidebar. PyPI has confirmed that the GitHub repository linked on the project page is owned by the same account that maintains the package — ruling out typosquatting and metadata spoofing.
- SHA-256 checksum + Cosign signature — every GitHub release publishes a
checksums.txtlisting SHA-256 hashes of all release artifacts, signed with SuprSend’s private key using Cosign.
checksums.txt came from SuprSend’s pipeline untampered (Step 4), then confirm your downloaded file matches the hash inside it (Step 5). Both steps are required — Step 4 alone does not verify your package, and Step 5 alone does not verify the source of the hashes.
Prerequisites
You need Cosign installed. It is a single binary with no runtime dependencies.- macOS
- Linux (amd64)
- Windows
Step 1 — Create a working directory
All files — the package and the three verification assets — must be in the same directory for the checksum step to work. Create a dedicated directory and switch into it before proceeding.- macOS / Linux
- Windows
Step 2 — Download the package
You have two options. Either way, save the file into thesuprsend-verify directory you just created.
Option A — pip3 download (recommended)
pip3 download fetches the package artifact locally without installing it. The -d . flag saves it into the current directory.
suprsend_py_sdk-0.18.1-py3-none-any.whl) directly in suprsend-verify.
--no-deps prevents pip3 from also downloading dependencies, keeping the directory clean for verification..whl filename to download it, then move it into the suprsend-verify directory before continuing.
Step 3 — Download the verification files
Run these commands from inside thesuprsend-verify directory:
- macOS / Linux
- Windows
suprsend-verify directory should contain exactly these files:
| File | Description |
|---|---|
checksums.txt | SHA-256 hashes of all release artifacts. This is what gets signed. |
checksums.txt.sig | The Cosign bundle — contains the signature over checksums.txt and its verification metadata. |
public_key.pem | SuprSend’s PEM-encoded public key. Used to verify the signature. |
Always download
public_key.pem directly from the official SuprSend Python SDK releases page. Do not copy it from mirrors or third-party sources.Step 4 — Verify the signature
| Argument | Description |
|---|---|
--key public_key.pem | SuprSend’s PEM-encoded public key. Cosign uses this to validate the signature. |
--bundle checksums.txt.sig | The Cosign bundle containing the signature and its metadata. |
checksums.txt | The artifact being verified — the SHA-256 manifest of all release artifacts. |
Verified OK confirms:
- The signature was produced using SuprSend’s private key — the key that corresponds to
public_key.pem. Only SuprSend’s release pipeline has access to it. checksums.txtis byte-for-byte identical to what was signed at release time.
Step 5 — Verify the package checksum
- macOS
- Linux
- Windows
To verify the
.tar.gz instead, replace the filename in the command with suprsend_py_sdk-0.18.1.tar.gz.Step 6 — Install the package
Once both verifications pass, install the SDK:Full script
Creates the working directory, downloads everything into it, verifies both the signature and the checksum, then installs.- macOS (Apple Silicon / Intel)
- Linux (x86_64 / ARM64)
- Windows (x86_64 / ARM64)
Reference
Available release artifacts
Available release artifacts
All artifacts are available on the GitHub releases page and the PyPI files page.
| Artifact | Description |
|---|---|
suprsend_py_sdk-{version}-py3-none-any.whl | Wheel — preferred for installation. Platform-independent. |
suprsend_py_sdk-{version}.tar.gz | Source distribution. |
Security model
Security model
SuprSend’s signing private key is held exclusively by the automated release pipeline and never leaves the secure signing environment.
public_key.pem is the public counterpart — it is published openly with every release and carries no risk of compromise.The PyPI Verified details badge confirms that the GitHub repository linked on the PyPI project page is owned by the same account that publishes the package, providing an additional layer of provenance assurance independent of the Cosign signature.