RPDI Engineering Journal
A Vulnerability Scanner Got Hacked and Took Down the European Commission — Here's How to Check If Your CI/CD Pipeline Has the Same Hole
The biggest supply chain attack of 2026 didn't target a company's application code — it targeted the security scanner that audits the code. Trivy, used by milli
How a Security Tool Became the Biggest Breach Vector of 2026
March 19, 2026: Distribution Channel Compromise. March 24, 2026: European Commission AWS Key Harvested. March 24-28: Data Exfiltration. March 28, 2026: ShinyHunters Publishes the Data.
The Attack Timeline — From Compromise to 300GB Exfiltration
1. Mutable Action Version Tags. 2. Auto-Updating Security Tools. 3. Overprivileged Pipeline Credentials. 4. Unaudited Third-Party Dependencies in Build Steps.
The 5 CI/CD Supply Chain Vulnerabilities You Need to Check Today
5. No Pipeline Integrity Monitoring. March 19, 2026: Distribution Channel Compromise. March 24, 2026: European Commission AWS Key Harvested. March 24-28: Data Exfiltration.
The Cost of Supply Chain Blindness
March 28, 2026: ShinyHunters Publishes the Data. 1. Mutable Action Version Tags. 2. Auto-Updating Security Tools. 3. Overprivileged Pipeline Credentials.
Your Security Tool Is an Attack Surface — Harden It Like One
4. Unaudited Third-Party Dependencies in Build Steps. 5. No Pipeline Integrity Monitoring.
Published by RP Digital Innovations — Custom Software & AI Automation, Houston TX
Talk to an operator →