BoostSecurity News, Press & Events

News

Defending Yourself From the Trivy CI/CD Compromise: How to Check Your Exposure and Respond

Over the past few years, Boost Security’s research team at Boost Labs has been deeply curious about how attackers might pivot from traditional application vulnerabilities to exploiting the CI/CD machinery itself. The team has spent extensive time studying "Living Off The Pipeline" (LOTP) techniques, mapping out how build tools, runner memory, and service accounts can be manipulated to turn the software factory against itself.

Read More
Build Pipelines (aka CI/CD) are often a total mess…

Unveiling 'poutine': An Open Source Build Pipelines security scanner

TL;DR BoostSecurity.io is thrilled to announce ‘poutine’ – an Open Source security scanner CLI you can use to detect misconfigurations and vulnerabilities in Build Pipelines. Additionally, it can create an inventory of build-time dependencies so you can track known vulnerabilities (CVEs) as well. Today, the tool has about a dozen rules covering vulnerabilities found in GitHub Actions workflows and Gitlab pipelines. We have plans to add support for CircleCI, Azure Pipelines and more. The source code is published under the Apache 2.0 license and it is available on GitHub.

Read More