Research
Vulnerability research and advisories
Actionable writeups with exploit context, metadata, and practical remediation details.
Template injection vector in CI pipeline variables
Analysis of a templating flaw that allows untrusted input to alter build-time commands.
Container registry token exposure through verbose logs
Leaked registry credentials observed in debug-level CI logs and artifact bundles.
Infrastructure policy bypass via nested module inheritance
A misconfiguration pattern in IaC modules can bypass deny rules under specific nesting conditions.
No matching content found.