Insecure system configuration
CI/CD systems involve infrastructure, network, and application configurations. Adversaries actively look for potential CI/CD misconfigurations and vulnerabilities they can exploit.
CI/CD systems involve infrastructure, network, and application configurations. Adversaries actively look for potential CI/CD misconfigurations and vulnerabilities they can exploit.