BoostSecurity Blogs, Press & Events

SmokedMeat: Boost Built the Open-Source Tool That Proves Your Pipeline Is Already a Target

Written by BoostSecurity.io | Apr 15, 2026 1:00:05 PM

For over three years now (since November 2022), Boost Labs has been publishing research on CI/CD attack techniques, documenting how attackers move through build pipelines, steal credentials, and pivot into cloud environments. Security teams read the research…and put the fixes on the backlog. Theoretical vulns don’t light a fire under any team.

TeamPCP ended the backlog era of pipeline security. In March 2026, a coordinated attack campaign compromised Trivy, Checkmarx, LiteLLM, and dozens of npm packages using the exact techniques our research had been describing. The vulnerabilities our scanner poutine had flagged in Trivy's pipeline months before the attack went unpatched…so when TeamPCP showed up, they walked straight through the door.

Security teams knew the risk was real, but until now, nobody could show an engineering leader (or a CISO) what "real" actually looked like in their specific environment. A static scan finding that says "workflow injection possible" does not convey what an attacker can do with that injection in the next 60 seconds. Without that, the fix stays on the backlog.

Today we're releasing SmokedMeat, an open-source red team framework for CI/CD pipelines. It takes a flagged vulnerability and turns it into a live demonstration: payload deployed, runner compromised, credentials harvested from process memory, AWS access exchanged, private repositories exposed, blast radius mapped. The full kill chain, running against your own infrastructure, so you can see exactly what an attacker sees.

Red teamers have been using tools like Metasploit for decades to simulate what attackers do against applications and infrastructure. That category of offensive tooling exists because seeing an attack run against your own systems, before an adversary does, turns theoretical risks into known ones. Attackers already have purpose-built offensive technology for CI/CD pipelines. SmokedMeat gives defenders the same capability.

Our previous open-source tool, poutine, finds the flaw. SmokedMeat proves what happens next. That combination moves pipeline security from the backlog to the top of the list: instead of theoretical misconfigurations, you can see and talk about what your AWS environment looks like from the attacker's side.

SmokedMeat is the first tool that treats a CI/CD attack as a complete operation. Scanners tell you where the exposure lives, but SmokedMeat runs the attack, from the initial foothold through credential theft, cloud access, and a map of everything now reachable. For the first time ever, a security leader can see the full consequence of a flagged vulnerability, in their own environment, in minutes. It was built by the same researchers who mapped these attacks before they happened, with the polish of a commercial red team platform and coverage of a domain those platforms have never touched. (If we sound proud…it’s because we are.)

SmokedMeat is available now on GitHub. If you've been waiting for a reason to show your team what pipeline security actually costs when it goes wrong, this is it.