Show HN: SmokedMeat, like Metasploit, but for CI/CD (open-source)
Posted by flexorium 2 days ago
A CI/CD Red Team Framework for demonstrating Build Pipeline security risks.
Comments
Comment by flexorium 2 days ago
Two years ago today, our small research team open sourced poutine, a SAST scanner for CI/CD pipelines (very similar to zizmor, but written in Go and customizable using Rego DSL). It finds the vulnerabilities in your build pipelines. As all security engineers know, running SAST and filing a JIRA ticket leads to nowhere.
Some weeks ago TeamPCP came on the scene and most were shocked to see the blast radius starting with Trivy then LiteLLM, KICS, etc. Trivy got pwn'd using textbook "pwn request".
I've been building SmokedMeat for the past 5 months to level the playing field. It's a Red Team framework for CI/CD pipelines. You scan a GitHub org workflows, pick from a menu of exploitable pipelines, you are guided through an exploitation wizard, wait… and you're in post-exploitation. Secrets already exfiltrated from runner process memory are in the Loot stash, ready to pivot into cloud accounts, private repos, and more. Live attack graph in the browser.
To try it: git clone https://github.com/boostsecurityio/smokedmeat.git cd smokedmeat make quickstart
Then you target the whooli GitHub org (https://github.com/whooli) a CTF playground to exploit (hint the final flag is in a Google Cloud Storage Bucket)
Happy to answer questions about the ethics, architecture, implant design, or CI/CD attack techniques.
Comment by gepeto42 2 days ago
Is this something only companies with public repos should be worried about?
Comment by frothy-dashcam 1 day ago
Comment by flexorium 2 days ago
Comment by guyle 1 day ago
On the defensive side, we are pushing to OIDC short-lived tokens - eliminating the this risk altogather
Comment by flexorium 6 hours ago
Comment by bavarianbob 2 days ago
Comment by flexorium 2 days ago
Comment by mrene 1 day ago