>
cryptographically secure audit log of all changes made, that allows you to know exactly what software you're actually shipping.To be pedantic: not quite.
Git is certainly a cryptographically secure audit log[ß] but it only tells you what the source code was that went _into_ the build at the time of checkout. You can subvert the process through malice (eg. Solar Winds), through incompetence (eg. off-tree "magic" patching as a build step), or through sheer negligence.
Reproducible and auditable builds are a much harder problem than source code provenance.
ß: from my previous job: once auditors understood what git is, they loved it. They, by their profession, love immutability. Failing that, they consider tamper-evidence a really good second-best.