RedTeamGuides

RedTeamGuides

25 Methods for Pipeline Attacks

Reza's avatar
Reza
Jan 26, 2025
∙ Paid

Add Approver using Admin permission on CI

  1. Unauthorized Approver Addition

In this scenario, an attacker with admin permissions on the CI pipeline adds an unauthorized user as an approver, potentially bypassing necessary security checks.

# Add unauthorized user as an approver
ci-tool add-approver --pipeline pipeline-name --user unauthorized-user
  1. Exploiting We…

User's avatar

Continue reading this post for free, courtesy of Reza.

Or purchase a paid subscription.
© 2025 RedTeamGuides · Privacy ∙ Terms ∙ Collection notice
Start your SubstackGet the app
Substack is the home for great culture