Supply Chain // Repos, Pipelines and Build Trust

DevSecOps, Supply Chain and CI/CD

Modern compromise increasingly happens before runtime. Repositories, packages, runners, secrets, signing systems and deployment automation sit upstream of the final target and quietly define what code becomes trusted. That makes DevSecOps and supply-chain assessment one of the highest-leverage offensive domains on the site.

domain huboperator referencepublic sources

Domain overview

This domain covers Git secrets, pipeline abuse, artifact poisoning, runner compromise, package trust, SBOM and signing, GitOps, secure build systems, cloud automation and the attack paths that emerge when developers and deployment systems share too much trust. The useful question is never just "can I read the repo?" It is "what can this development and release path produce, sign, deploy or overwrite for me?"

How to approach this surface

  • Source access is only the beginning. The real question is what the pipeline can build, sign, publish or deploy without enough friction.
  • Secrets in code, history, CI variables and runner disks are still common, but the bigger prize is often execution in the build environment itself.
  • Package trust is social as much as technical. Namespace confusion, mirror trust, version drift and transitive dependencies all widen the attack surface.
  • GitOps moves operational trust into declarative repos. That can be elegant, but it also means repo compromise becomes infrastructure compromise.
  • Signing and provenance do not eliminate risk; they change where you have to attack. Key custody, workflow identity and attestation enforcement become the new pressure points.

Related certification and framework context

Curated public references

Brief index