SmokedMeat: Open-source tool shows what attackers do inside CI/CD pipelines

Source: Help Net Security

Author: Mirko Zorz

URL: https://www.helpnetsecurity.com/2026/04/20/smokedmeat-ci-cd-pipeline-attacks/

ONE SENTENCE SUMMARY:

SmokedMeat is an open-source tool simulating real CI/CD exploit chains to demonstrate impact, prioritize fixes, and prevent supply-chain cascades.

MAIN POINTS:

  1. Boost Security released SmokedMeat to emulate attacker behavior inside CI/CD environments.
  2. It begins from a flagged pipeline vulnerability and executes a live, end-to-end exploit.
  3. Demonstrations include deploying payloads and compromising CI/CD runners within target infrastructure.
  4. The framework extracts credentials directly from process memory after runner compromise.
  5. Stolen secrets can be exchanged for cloud access to expand attacker control.
  6. Private repository exposure is simulated to show code and supply-chain compromise potential.
  7. Blast-radius mapping helps quantify how far a single pipeline flaw can propagate.
  8. CEO Zaid Al Hamami highlighted pivoting to implant malware and infect developer workflows.
  9. TeamPCP (March 2026) compromised major tools and many npm packages using known techniques.
  10. Unpatched vulnerabilities previously flagged by Boost’s Poutine scanner illustrated remediation deprioritization risks.

TAKEAWAYS:

  1. Seeing exploitation on your own infrastructure drives faster, better remediation decisions.
  2. Pipeline vulnerabilities can rapidly escalate into cloud compromise and broad lateral movement.
  3. Static findings like “workflow injection” often understate real-world attacker capabilities.
  4. Supply-chain campaigns can cascade when known CI/CD weaknesses remain unpatched.
  5. Free, open-source attack-simulation frameworks can operationalize CI/CD security improvements.