Github Labs
Explore 1 lab in Github.
Poisoned Pipeline Execution (PPE) occurs when untrusted code is injected into a CI/CD pipeline and executed with the privileges of the pipeline environment. This often happens when pull requests, external contributions, or compromised dependencies are built and executed without proper isolation. If these jobs inherit repository or organisation secrets, attackers can exploit PPE to exfiltrate sensitive data, alter build outputs, or gain persistence in downstream environments.
Examples include:
Select a language to explore available labs for this vulnerability.
Try adjusting your language filter.
Want to skill-up in secure coding and AppSec? Try SecDim Wargames to learn how to find, hack and fix security vulnerabilities inspired by real-world incidents.
Join our secure coding and AppSec community. A discussion board to share and discuss all aspects of secure programming, AppSec, DevSecOps, fuzzing, cloudsec, AIsec code review, and more.
Read more