AGCG Genuine
Consulting Group

Cybersecurity • IT Governance

The Resurgence of Supply Chain & CI/CD Attacks

By Arnaud GODET, Managing Partner – AGCG Genuine Consulting Group

AGCG Watch Note – When the development chain becomes the primary attack surface.

Watch Notes & Insights

Topic : Software supply chain, DevSecOps, CI/CD security
Firm : AGCG Genuine Consulting Group

⏱ Reading time : ~9 minutes
Target audience : COMEX, CIOs, CISOs, CTOs, DevSecOps managers

Key Figures

70 %
of the average software base
in open source components
90 %
of CI/CD pipelines
tested contain
at least one exposed secret

Supply chain / CI/CD attacks are no longer exceptional events: they are becoming a standard mechanism for compromising thousands of systems in a single operation.

For attackers, compromising the chain that produces the software is often more effective than targeting each application individually.

Introduction: The Development Chain as a New Attack Surface

Since SolarWinds, Codecov, 3CX, and the compromise of widely used open source dependencies (Log4j, XZ Utils), supply chain attacks are no longer anomalies, but a well-established attack method. Attackers have realized that it’s often more effective to compromise the system that produces and distributes software... than the software itself.

DevOps environments and CI/CD pipelines now contain critical assets for businesses: source code, secrets, production access, SaaS integrations, container images, industrialization pipelines. They have become prime targets.

1. Why Supply Chain Attacks Are Coming Back Stronger

1.1. Explosion of Open Source Dependencies

A modern application primarily relies on open source components (libraries, frameworks, tools). Attackers now target maintainers, popular packages, abandoned repositories, and exploit automatic updates to spread silently.


1.2. Massively Exposed CI/CD Pipelines

CI/CD pipelines contain everything an attacker dreams of: tokens, SSH keys, application secrets, access to registries and clusters, rights to staging and production environments. In many organizations, these pipelines are insufficiently isolated, poorly logged, and rarely audited for security.


1.3. “Dependency Confusion” Attacks

“Dependency confusion” attacks exploit the fact that internal applications use package names identical to those of public registries. By publishing a malicious package with the same reference on a public registry, the attacker can force misconfigured pipelines to consume the compromised version.


1.4. Proliferation of Uncontrolled SaaS Integrations

GitHub, GitLab, Jira, CircleCI, SonarQube, Artifactory, Cloud registries, testing platforms… The interconnected tool ecosystem is exploding. Each integration adds an attack surface, especially when authentication is weak, permissions too broad, and logs incomplete.

2. The Main Attack Methods on Supply Chain & CI/CD

2.1. Injection in Dependencies

Attackers publish malicious packages on public registries (npm, PyPI, RubyGems, Maven Central, etc.). These packages embed code designed to steal secrets, exfiltrate source code, or deploy cryptocurrency mining.


2.2. Compromise of CI/CD Pipelines

By targeting runners, CI hooks, or authentication tokens, the attacker can manipulate build steps, insert malicious code into binaries, and retrieve secrets or sensitive artifacts. Once the pipeline is compromised, it becomes an ideal propagation vector.


2.3. Compromise of Maintainers and Developer Accounts

Targeted phishing, password reuse, attacks on developers’ personal accounts contributing to critical projects: once the account is compromised, the attacker can push legitimate-looking but malicious versions to trusted repositories.


2.4. Attacks on Image Registries

Image registries contain the base containers used by thousands of applications. A compromised or unmaintained image can propagate massive vulnerabilities across the entire ecosystem.

3. Why These Attacks Are Especially Critical

3.1. An Invisible Yet Systemic Risk

A compromised CI/CD chain is not visible in traditional dashboards: applications continue to deploy, tests pass, pipelines are “green.” Yet, the produced code may already be modified, instrumented, or weakened.


3.2. Massive and Silent Propagation

A single compromised dependency can affect thousands, even millions, of systems. A single vulnerable container image can be deployed across dozens of microservices and client environments.


3.3. A Trust Shock for Clients and Regulators

A successful supply chain attack undermines trust in the entire value chain: publisher, integrator, operator, ecosystem. It generates significant regulatory, contractual, and reputational impacts, especially for SaaS players.

4. What International Frameworks Recommend

Several frameworks converge on the measures to implement: NIST SSDF, CISA Secure by Design & Secure CI/CD, OWASP SCVS, as well as recommendations from GitHub Security Lab or Sonatype.

  • Implement a SBOM (Software Bill of Materials) for all key applications
  • Strictly isolate CI/CD environments (ephemeral runners, network segmentation, MFA)
  • Sign artifacts and images, control provenance and integrity
  • Systematically scan dependencies and secrets in code and pipelines
  • Apply the least privilege principle to all DevOps accounts and integrations
  • Monitor pipeline, registry, and developer account activities

5. AGCG’s Feedback: What We See in Organizations

In the DevSecOps and CI/CD audits performed by AGCG, a strong trend emerges: most organizations significantly underestimate their supply chain exposure.

  • Secrets (tokens, keys, passwords) present in more than 90 % of pipelines
  • Absence of formalized SBOM in most cases
  • Persistent, shared CI/CD runners, rarely hardened
  • Container images not updated or scanned
  • Excessive permissions for developer accounts and SaaS integrations

In this context, even the slightest compromise of an account, pipeline, or registry can have a disproportionate impact compared to the initial incident.

6. Priorities for Companies Right Now

  • Establish a complete SBOM for critical applications
  • Audit and harden CI/CD pipelines (isolation, MFA, logs, ephemeral secrets)
  • Control all dependencies (verification, approval, continuous scanning)
  • Secure developer accounts (robust MFA, FIDO2 keys, token rotation)
  • Implement specific supply chain monitoring (dependencies, registries, pipelines)
  • Sign commits, artifacts, and images to guarantee integrity and traceability

It’s not just about “hardening CI/CD,” but about taking control of the software lifecycle, from design to production, by integrating security as a native property of the pipeline.

“Software supply chain has become one of the few points where a single action by an attacker can generate thousands of victims. Regaining control of the CI/CD chain means regaining control of your software sovereignty.”

— AGCG Genuine Consulting Group

Conclusion: The Software Supply Chain as the New Cyber Frontier

Supply chain & CI/CD attacks represent one of the most asymmetric risks in the cyber landscape: a single compromised dependency, a single vulnerable pipeline, a single exposed secret can trigger system-wide impacts.

For organizations, the question is no longer whether they will be targeted through their software supply chain, but whether they will be ready when it happens. Taking control of the development cycle and CI/CD becomes a pillar of global resilience.

At AGCG, we help companies transform their CI/CD pipelines into trusted assets: audited, hardened, monitored, and aligned with international standards, making the software supply chain a differentiating factor rather than a weak point.

Sources & References

  • NIST – Secure Software Development Framework (SSDF)
    (See)
  • CISA – Secure by Design / Secure CI/CD
    (See)
  • OWASP – Software Component Verification Standard (SCVS)
    (See)
  • GitHub Security Lab
    (See)
  • Sonatype – State of the Software Supply Chain
    (See)