Defensive Research, Weaponized: The 2025 State of Pipeline Security
boostsecurity.io¡1h
🔓Hacking
Preview
Report Post

December 10th 2025, by François Proulx, VP of Security Research @ BoostSecurity.io

TL;DR: 2025 didn’t give us a new, magical Supply Chain vuln class;** instead it gave us attackers who finally started reading our manuals**.

From Ultralytics’ pull_request_target 0‑day (where a BreachForums post indicates they used our own poutine scanner to find it) through Kong, tj-actions, GhostAction, Nx, GlassWorm and both Shai‑Hulud waves, the common pattern wasn’t typosquats but Pipeline Parasitism: living off CI/CD, maintainer accounts and developer endpoints using the same tools and patterns we publish…

Similar Posts

Loading similar posts...