Reflections on trusting plugins: Backdooring Jenkins builds

Reflections on trusting plugins: Backdooring Jenkins builds

In this post we explore how an attacker who has compromised a Jenkins instance can backdoor software built with it and what security measures are critical to ensure protection against attacks.   The post Reflections on trusting plugins: Backdooring Jenkins builds appeared first on Software Integrity Blog ... Read More