Defending Yourself From the Trivy CI/CD Compromise: How to Check Your Exposure and Respond
Over the past few years, Boost Security’s research team at Boost Labs has been deeply curious about how attackers might pivot from traditional application vulnerabilities to exploiting the CI/CD machinery itself. The team has spent extensive time studying "Living Off The Pipeline" (LOTP) techniques, mapping out how build tools, runner memory, and service accounts can be manipulated to turn the software factory against itself.
