Running malicious code in your CI, without access to your CI — Authors Omer Gil, Head of Research @ Cider Security
Daniel Krivelevich, CTO @ Cider Security Intro Dev environments have become a major part of today’s attack surface. And within them, the most lucrative assets are the systems responsible for CI and CD — those that build, test, and deploy code — and…