$ head featured.md
SmokedMeat: A Red Team Tool to Hack Your Pipelines First
FEATURED tools

SmokedMeat: A Red Team Tool to Hack Your Pipelines First

TL;DR

In March 2026, TeamPCP unleashed mayhem on the software supply chain: compromising Trivy, LiteLLM, KICS, Telnyx, and dozens of npm packages, proving that CI/CD pipelines are the softest target. Today we're open-sourcing SmokedMeat, the first red team framework for build pipelines (i.e. CI/CD), so defenders can finally see the full kill chain for themselves.

--author "François Proulx"
François Proulx
François Proulx VP of Security Research

François is the VP of Security Research at Boost Security and co-creator of the poutine Open Source CI/CD scanner. He co-founded the Living Off The Pipeline (LOTP) project to describe the abuse of build tools for lateral movement. After spending years teaching defenders how to secure their workflows, he is now demonstrating how attackers are dismantling them.

| --date 2026-04-15 | --read-time 6 min
#smokedmeat#ci-cd#red-team#open-source#supply-chain#poutine
$ ls articles/

Recent Articles

Deployment Poisoning: A Novel Attack Vector for GitHub Actions

Deployment Poisoning: A(nother) Novel Attack Vector for GitHub Actions

TL;DR

A newly discovered attack technique allowing attackers to inject commands and exfiltrate secrets by creating malicious deployments from fork pull requests. Exploits the trust assumption that deployments come from verified services like Vercel, affecting popular integrations including Argos CI and Checkly.

TeamPCP Compromises LiteLLM

TeamPCP Compromises LiteLLM: Credential Stealer in PyPI, 70 Repos Exposed

TL;DR

TeamPCP published two malicious litellm versions to PyPI containing a .pth infostealer that runs on every Python startup. A compromised maintainer account was then used to silence the disclosure, deface repositories, and expose 70 private BerriAI repos in minutes. This is a Boost Security contribution to a broader community investigation: multiple teams worked this incident in parallel, each bringing their own angle. We focused on CI/CD forensics and GitHub account takeover evidence. The hunt continues.

20 Days Later: Trivy Compromise, Act II

20 Days Later: Trivy Compromise, Act II

TL;DR

Almost exactly one year after the tj-actions/changed-files compromise, history repeats. Twenty days after the February Pwn Request on Trivy that we covered in our previous report, the attacker regained access to the Aqua Security org (through a vector still under investigation) and weaponized the aqua-bot service account. On March 19, 2026, poisoned v0.69.4 releases of Trivy were pushed through GitHub Releases, Docker registries, and 75 of 76 tags on the trivy-action GitHub Action. This is an early publication in the interest of community threat hunting; our investigation is ongoing.

MegaGame10418: A Throwaway Account Linked to the Hackerbot-Claw Attack

MegaGame10418: A Throwaway Account Linked to the Hackerbot-Claw Attack

TL;DR

Between February 27–28, 2026, the GitHub user 'hackerbot-claw' launched an automated Pwn Request campaign targeting eight high-profile repositories using the AI agent 'openclaw.' Our Package Threat Hunter caught the attack in progress. Further investigation revealed 'MegaGame10418'—a throwaway account that predated the campaign by a month—used to test the same injection techniques against a vulnerable NewRelic test repository.

$ head articles/**/*.md | more
$ git clone github.com/messypoutine/gravy-overflow

MessyPoutine CTF

Learn pipeline exploitation hands-on. Pwn requests, LOTP techniques, confused deputies, and all the gravy.

Start hacking