Release Pipeline

Poisoned CI Action

This page simulates a compromised CI/action chain where workflow secrets, action tags, and release metadata were tampered with after automation credentials were exposed.

Release monitor

Expected Findings

  • Workflow file exposes privileged release secrets and unsafe trust assumptions.
  • Action tags were force-moved to malicious commits.
  • Audit log shows compromised automation credentials being reused.

Signals

Workflow Secret
TRIVY_GITHUB_TOKEN: ${{ secrets.RELEASE_PAT }}
Retag
v0.69.4 -> 1f2e3d4 malicious commit

Notes

  • This emulates a poisoned automation pipeline and tag-retargeting pattern, not a live code execution path.