Under The Radar: Zero-Days in Open Source Build Pipelines
TL;DR: Our deep dive into open source projects’ CI/CD systems has revealed that build pipelines...
TL;DR: CI/CD remains a stealthy and soft target for supply chain attacks—especially via linters, formatters, build and test tools. This guide breaks down Living Off the Pipeline (LOTP) techniques, where attackers exploit CI tools already present and without modifying the workflow itself—using config files, plugins, and environment variables instead.
One of the cornerstones of open source is the pull request mechanism that lets anyone contribute by adding features, squashing bugs, or simply refining the code. But as with any open door, vulnerabilities creep in. Over the years, so-called pwn requests have emerged, where attackers sneak in malicious payloads via pull requests. Even in 2025, with tightened default permissions and hardened workflow events, vulnerable CI/CD pipelines still exist, sometimes in surprisingly stealthy ways.
If you’re scratching your head wondering, “What exactly is a pwn request?” check out our earlier post, Under The Radar: Zero-Days in Open Source Build Pipelines, where we highlighted how a workflow with certain permissions or secrets on an upstream repo can be compromised by an attacker-controlled fork.
Pwn requests are easy to dismiss as common sense:
“Run a bash script from an untrusted source, and yeah, you’ll get hacked eventually.”
- Average Hacker News commenter circa 2016
True enough, but the devil is in the details. Most attacks exploit how CI/CD tools often execute code in unexpected ways, catching even the most security-conscious people off guard.
Enter the Living Off the Pipeline (LOTP) project. As detailed in The Tale of a Supply Chain Near-Miss Incident, LOTP catalogs common CI/CD tools that can be weaponized if an attacker controls their context. This context can include configuration and source files, environment variables, and other elements that do not require modifying the workflow itself.
So far, we’ve identified six primary methods in the LOTP playbook. Each tool's name links to a more detailed explanation:
The next two RCE vectors are also found in the wild, but they only come into play when the code is run, packaged, or exported. Since executing code naturally paves the way for RCE, we’ve placed them in a separate category, even though their signs might not be as obvious as you’d expect.
In addition to the essential recommendations in Under The Radar: Zero-Days in Open Source Build Pipelines, try these extra tactics to further raise the bar against potential attacks:
Over the past months, we’ve greatly expanded the LOTP inventory to include more tools vulnerable to attacker-controlled context files. But the threat landscape is always evolving. Here are a couple of additional vectors to keep on your radar:
TL;DR: Our deep dive into open source projects’ CI/CD systems has revealed that build pipelines...
TL;DR: We've been quiet lately—despite recent Supply Chain drama—because we wanted a clearer...