Github Labs
Explore 2 labs in Github.
CI/CD pipelines often rely on credentials such as API keys, SSH keys, cloud tokens, or service account secrets to fetch dependencies, deploy artifacts, or interact with external services. Insufficient credential hygiene arises when these secrets are hard-coded in configuration files, stored in plaintext, over-privileged, or left unrotated. An adversary who gains access to the pipeline environment (e.g., via logs, cache, or a compromised job) can extract these credentials and pivot into sensitive systems, leading to source code theft, supply chain attacks, or full infrastructure compromise.
Select a language to explore available labs for this vulnerability.
Try adjusting your language filter.
Want to skill-up in secure coding and AppSec? Try SecDim Wargames to learn how to find, hack and fix security vulnerabilities inspired by real-world incidents.
Join our secure coding and AppSec community. A discussion board to share and discuss all aspects of secure programming, AppSec, DevSecOps, fuzzing, cloudsec, AIsec code review, and more.
Read more