Verifying releases
How to verify the integrity of downloaded Testnizer installers using SHA-256 checksums.
Every release published to github.com/apinizer/testnizer-releases includes SHA-256 checksums for each artifact. Verifying them confirms the file you downloaded arrived intact and was not tampered with in transit.
Where to find checksums
Each release page lists a checksums.txt file alongside the installers. It
contains one line per artifact:
sha256:a3f8… Testnizer-1.0.3-arm64.dmg
sha256:c91b… Testnizer-1.0.3-x64.dmg
sha256:e54a… Testnizer-Setup-1.0.3-x64.exe
sha256:2d77… Testnizer-1.0.3-amd64.deb
…
Verifying on macOS / Linux
shasum -a 256 Testnizer-1.0.3-arm64.dmg
Compare the output hash with the matching line in checksums.txt. They must
match exactly.
Verifying on Windows (PowerShell)
Get-FileHash .\Testnizer-Setup-1.0.3-x64.exe -Algorithm SHA256
Compare the Hash field against checksums.txt.
Air-gapped install
For fully isolated networks:
- On a connected machine, open the
latest release
and download the installer for your platform plus
checksums.txt - Verify the SHA-256 as above
- Transfer the installer to the isolated machine via USB / SFTP / your air-gap gateway
- Install normally
After installation, disable the auto-update check on the isolated machine: Settings → Updates → Automatic update check → off.
Release integrity
Releases are built by GitHub Actions on isolated per-OS runners. The workflow logs and artifact upload steps are publicly visible at github.com/apinizer/testnizer-releases so you can trace each artifact back to the exact build run that produced it.
Reporting issues
Open an issue at github.com/apinizer/testnizer-releases/issues.
Security issues — please email info@testnizer.com rather than opening
a public issue.