Submitter : c2a
Date: 2 May 2022
Bounty : undisclosed
Vulnerabilities :
Programs :
Authors :
Link : https://www.legitsecurity.com/blog/github-actions-that-open-the-door-to-cicd-pipeline-attacks
Submitter : c2a
Date: 2 May 2022
Bounty : undisclosed
Vulnerabilities :
Programs :
Authors :
Link : https://www.legitsecurity.com/blog/github-actions-that-open-the-door-to-cicd-pipeline-attacks