logoalt Hacker News

Rial_Labsyesterday at 10:14 PM2 repliesview on HN

Author here. Built VaultProof after analyzing the Trivy attack the credential harvesting worked specifically because the keys existed as plaintext in the CI/CD environment after retrieval from the secrets manager. Happy to go deep on the Shamir architecture or the attack mechanics if useful.


Replies

stavrostoday at 1:30 AM

Why use a Shamir architecture at all, instead of giving the CI run an ephemeral token that will be exchanged on the proxy?

show 1 reply
dborehamtoday at 1:20 AM

Can you explain what this is please? "Exploits mutable Git tags and self-declared commit identity"

show 1 reply