RedTeamGuides

RedTeamGuides

25 Methods for Pipeline Attacks

Reza's avatar
Reza
Jan 26, 2025
∙ Paid
Share

Add Approver using Admin permission on CI

  1. Unauthorized Approver Addition

In this scenario, an attacker with admin permissions on the CI pipeline adds an unauthorized user as an approver, potentially bypassing necessary security checks.

# Add unauthorized user as an approver
ci-tool add-approver --pipeline pipeline-name --user unauthorized-user
  1. Exploiting We…

Keep reading with a 7-day free trial

Subscribe to RedTeamGuides to keep reading this post and get 7 days of free access to the full post archives.

Already a paid subscriber? Sign in
© 2025 RedTeamGuides
Privacy ∙ Terms ∙ Collection notice
Start your SubstackGet the app
Substack is the home for great culture