Remove tag secrets-scanning
article thumbnail

The GitHub Actions Worm: Compromising GitHub Repositories Through the Actions Dependency Tree

Prisma Clud

Get an in-depth look at the attack vectors, technical details and a real-world demo in this blog post highlighting our latest research. The payload tries to steal secrets or create a reverse shell, whether running in pipelines or production environments. Is the GITHUB_TOKEN as accessible as other secrets? We’ll soon find out.

Malware 144
article thumbnail

Strengthening the Nessus Software Supply Chain with SLSA

Tenable

But sometimes we like to give you a peek behind the curtain to share how we protect our own house against cyberattacks – and that’s what this blog is about. The provenance contains the information needed to recreate the build if required, including the source repository tags that the build process uses.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

How to make your web application more secure by using Interactive Application Security Testing (IAST) – PART 3 of Application Security Testing series

Xebia

Introduction Welcome to part three of the blog series about Application Security Testing. In this blog we are going to learn about Interactive Application Security Testing (IAST). Client-side code is not scanned for vulnerabilities. We will look at their SCA solution in a later blog. It is time to get practical.

article thumbnail

Authoring “Docker for Developers” for Packt Publishing

Modus Create

Chapter 14: Advanced Docker Security – Secrets, Secret COmmands, Tagging, and Labels. Chapter 15: Scanning, Monitoring, and Using Third-Party Tools. In February of 2018, Modus published a blog post, also named “ Docker for Developers.” Chapter 13: Docker Security Fundamentals and Best Practices.

article thumbnail

Identifying Server Side Request Forgery: How Tenable.io Web Application Scanning Can Help

Tenable

Web Application Scanning can help. An SSRF can be used by an attacker to access internal services that may be sensitive or to retrieve resources such as configuration files containing credentials and other secrets. As an example, cloud services like AWS provide endpoints that return metadata containing some sensitive data and secrets.

article thumbnail

Detect hardcoded secrets with GitGuardian

CircleCI

To keep things secure, we always need the same thing: a secret. What is a secret? Secrets are digital authentication credentials (API keys, certificates, and tokens) used in applications, services, or infrastructures. Watch the video: What is a secret? Why are secrets a problem in CI/CD environments?

article thumbnail

Securing Golden Images at Build Using Prisma Cloud

Prisma Clud

It’s a best practice to scan images during the build process. Shifting left and scanning for compliance issues and vulnerabilities in the image build process can help eliminate runtime issues when instances are instantiated. If the scan results don’t meet the predefined thresholds, the build fails and no image is created.

Cloud 52