Github Labs
Explore 1 lab in Github.
This risk arises when individual steps in a CI/CD pipeline lack granular access controls, or when access checks are not enforced consistently between stages. Without strict step-level isolation, an adversary can exploit race conditions (e.g., Time-of-Check to Time-of-Use / TOCTOU) to modify artifacts, configuration files, or credentials in the gap between validation and execution. This allows unauthorised escalation of privileges within the pipeline, bypassing intended security boundaries and compromising downstream deployments.
Select a language to explore available labs for this vulnerability.
Try adjusting your language filter.
Want to skill-up in secure coding and AppSec? Try SecDim Wargames to learn how to find, hack and fix security vulnerabilities inspired by real-world incidents.
Join our secure coding and AppSec community. A discussion board to share and discuss all aspects of secure programming, AppSec, DevSecOps, fuzzing, cloudsec, AIsec code review, and more.
Read more