Pipeline Implants: Moving Supply Chain Attacks from Dependencies to the CI/CD Runner
instatunnel.my·2d·
Discuss: r/programming
🚀CI/CD
Preview
Report Post

Pipeline Implants: Moving Supply Chain Attacks from Dependencies to the CI/CD Runner 🏗️💉

In the last decade, the cybersecurity industry focused its collective energy on securing the “building blocks” of software: dependencies. We saw the rise of Software Composition Analysis (SCA) tools to catch malicious NPM packages, typosquatting in PyPI, and vulnerabilities in Maven. However, as the industry hardened its defenses against rogue dependencies, attackers shifted their focus further upstream.

The new frontier of supply chain warfare isn’t just the code you import; it is the infrastructure that builds your code.

Welcome to the era of Pipeline Implants and Poisoned Pipeline Execution (PPE). In this deep dive, we will explore how attackers are moving from malicious libraries …

Similar Posts

Loading similar posts...

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help