Skip to content

Latest commit

 

History

History
27 lines (22 loc) · 1.18 KB

File metadata and controls

27 lines (22 loc) · 1.18 KB

Exercise4: Attack against CI/CD

Goal

  • Attack on CI/CD pipelines and understanding the attack surface
    • Assume a developer's device is compromised
    • Assume tool/software dependencies are compromised

Exercises

  • Overwrite source code without any review
  • Steal secrets from a non-protected branch
  • Try Supply-Chain attacks via Actions the repository uses

Additional Exercises

Exercises Procedure

1. Overwrite source code without any review

  • Push source code to the main branch directly

2. Steal secret from non-protected branch

  • echo ${{ secrets.GCP_SA_KEY }} | base64 on CI

3. Try Supply-Chain attacks via Actions the repository uses