Hugo

Passionate about programming, I began my career as a developer and private tutor in C/C++ before transitioning into offensive cybersecurity. For the past five years, I have worked as an offensive security auditor at Deloitte Cyber, where I conduct a wide range of penetration tests and technical audits. I am also responsible for designing and developing Pentest and Red Team infrastructure using Infrastructure as Code, with a strong focus on automation and operational efficiency.

This dual role - combining offensive security with infrastructure development - naturally led me to specialize in the security of CI/CD workflows. Through numerous audits and penetration tests for a wide range of clients across various environments, I have developed a deep and critical expertise in pipeline security, particularly within platforms such as Azure DevOps and GitHub Actions.


Session

10-24
09:30
30min
From YAML to Root: CI/CD Pipeline Attacks and Countermeasures
Hugo

As CI/CD pipelines become integral to modern software development through systems like Azure DevOps or GitHub Actions, and tools such as Terraform and Ansible, their compromise can have devastating effects, from infrastructure breaches to mass malware distribution.

Originally, CI/CD pipelines were managed and accessed only by a limited group of administrators or integration engineers. However, with the widespread adoption of Infrastructure as Code, it has become increasingly common for companies to open controlled access to their pipelines—sometimes even to external clients. This shift supports use cases such as self-service sandbox environments, client-controlled infrastructure provisioning, or dynamic testbed deployments in multi-tenant platforms. While these scenarios offer flexibility and scalability, they also introduce new risks and potential attack vectors, making it critical to rethink pipeline security under this broader exposure model.

In this talk, we will demonstrate how an attacker can exploit seemingly limited permissions—such as those of a standard contributor account—to fully compromise a CI/CD pipeline and the underlying infrastructure. By chaining misconfigurations, abusing legitimate features, and bypassing common restrictions, we’ll show how limited access can quickly escalate into full control.
In the second phase of the talk, we’ll look at the defensive side: how a company can effectively secure its pipelines in a context where access is no longer limited to internal teams.

topic: hack.lu
Europe