Insecure system configuration

CI/CD systems involve infrastructure, network, and application configurations. Adversaries actively look for potential CI/CD misconfigurations and vulnerabilities they can exploit.