Pipeline-Specific Attack Vectors
Pipeline-Specific Attack Vectors
Code injection attacks target the pipeline itself rather than the application being built. Attackers who gain access to repository systems can inject malicious code that executes during the build process. This code might steal secrets, modify build artifacts, or establish persistent access to the build environment. Pipeline-as-code implementations, while improving maintainability, can become vectors for these injection attacks if not properly secured.
Build system compromises allow attackers to modify the software compilation process. By altering build configurations, injecting malicious build steps, or replacing legitimate tools with compromised versions, attackers can insert backdoors or vulnerabilities into every application built by the system. These modifications can be subtle and difficult to detect, potentially affecting numerous applications before discovery.
Artifact poisoning attacks target the storage and distribution systems for built applications. Attackers who compromise artifact registries can replace legitimate application versions with malicious ones. Without proper signing and verification mechanisms, these poisoned artifacts can be deployed to production systems, affecting end users. The trusted nature of internal artifact registries makes these attacks particularly dangerous.