Resources
Broader Threat Coverage

Broader threat coverage

Currently supported:

  • Threats that trigger during build processes and CI/CD (install-time)


    If a malicious package gets installed during the build, an attacker can perform some of these activities in the context of the build system:

    • Steal code and any hardcoded sensitive data along with it.
    • Plant a backdoor in code to be used after the code is deployed to the production environment.
    • Steal compute resources like CPU, RAM, etc. for activities like crypto mining.
    • Steal environment variables, sensitive files, credentials, certificates, etc.
    • Perform lateral movement and privilege escalation with the data collected.

Future:

  • maintainer risk: expiring domains, large changes, no 2FA
  • mismatching metadata e.g. shasums, git contexts, etc.