https://boostsecurityio.github.io/lotp/
boostsecurityio/lotp
https://boostsecurityio.github.io/lotp/
living-off-the-pipeline lotp supply-chain-security
Last synced: 3 months ago
JSON representation
boostsecurityio/lotp
- Host: GitHub
- URL: https://boostsecurityio.github.io/lotp/
- Owner: boostsecurityio
- License: apache-2.0
- Created: 2024-02-15T14:56:05.000Z (about 1 year ago)
- Default Branch: main
- Last Pushed: 2024-12-16T15:30:17.000Z (5 months ago)
- Last Synced: 2025-01-18T08:37:47.764Z (4 months ago)
- Topics: living-off-the-pipeline, lotp, supply-chain-security
- Language: HTML
- Homepage:
- Size: 52.7 KB
- Stars: 110
- Watchers: 10
- Forks: 9
- Open Issues: 27
-
Metadata Files:
- Readme: README.md
- License: LICENSE
- Codeowners: .github/CODEOWNERS
Awesome Lists containing this project
- awesome-lol-commonly-abused - LOTP - Living Off the Pipeline. The idea of the LOTP project is to inventory how development tools (typically CLIs), commonly used in CI/CD pipelines, have lesser-known RCE-By-Design features ("foot guns"), or more generally, can be used to achieve arbitrary code execution by running on untrusted code changes or following a workflow injection. (DevOps / General)
- awesome-lol-commonly-abused - LOTP - Living Off the Pipeline. The idea of the LOTP project is to inventory how development tools (typically CLIs), commonly used in CI/CD pipelines, have lesser-known RCE-By-Design features ("foot guns"), or more generally, can be used to achieve arbitrary code execution by running on untrusted code changes or following a workflow injection. (DevOps / General)
README
# Living Off the Pipeline (LOTP)
[](https://github.com/boostsecurityio/lotp "Go to GitHub repo")
[](https://github.com/boostsecurityio/lotp)
[](https://github.com/boostsecurityio/lotp)
[](https://github.com/boostsecurityio/lotp/issues)
[](https://opensource.org/licenses/Apache-2.0)[](https://boostsecurityio.github.io/lotp/)
# Introduction
The idea of the LOTP project is to inventory how development tools (typically CLIs), commonly used in CI/CD pipelines, have lesser-known RCE-By-Design features ("foot guns"), or more generally, can be used to achieve arbitrary code execution by running on untrusted code changes or following a workflow injection.
# Contributions
We welcome contributions submitted as `Pull Requests` with new tool contributions or simply `Issues` for new ideas.
# License
Released under [Apache 2.0](/LICENSE) by [@boostsecurityio](https://github.com/boostsecurityio).
---
# Prior art / Credits
This project is largely inspired from previous projects such as:
- https://gtfobins.github.io
- https://lolbas-project.github.io
- https://github.com/rotem-cider/cicd-lamb