{
  "name": "Subresource Integrity & Supply Chain Hardening",
  "short_name": "SRI Guide",
  "description": "A comprehensive technical reference for SRI, supply chain hardening, hash generation, CDN trust mapping, and dependency auditing.",
  "start_url": "/",
  "display": "standalone",
  "orientation": "any",
  "background_color": "#f0f6fb",
  "theme_color": "#2860a0",
  "lang": "en",
  "categories": ["education", "developer", "security"],
  "icons": [
    {
      "src": "/assets/icons/favicon.svg",
      "sizes": "any",
      "type": "image/svg+xml",
      "purpose": "any"
    },
    {
      "src": "/assets/icons/apple-touch-icon.svg",
      "sizes": "any",
      "type": "image/svg+xml",
      "purpose": "maskable"
    }
  ],
  "screenshots": [],
  "shortcuts": [
    {
      "name": "SRI Fundamentals",
      "url": "/core-sri-fundamentals-browser-security-boundaries/",
      "description": "Core SRI concepts, hash algorithms, and browser enforcement"
    },
    {
      "name": "Asset Hashing",
      "url": "/asset-hashing-dynamic-script-injection/",
      "description": "Hash generation, CDN trust, and dynamic script loading"
    },
    {
      "name": "Supply Chain",
      "url": "/supply-chain-auditing-dependency-verification/",
      "description": "Dependency auditing, SBOMs, and provenance verification"
    }
  ]
}

