# Boost Security Labs the research arm of Boost Security
research
poutine flagship
Build Pipeline Security Scanner
bagel
Developer Workstation Security Scanner
gobelin
Go Repojacking Vulnerability Detector
puant
Unicode PUA Obfuscation Detector
lev-calc
LEV Vulnerability Exploitability Calculator
// coming soon
smokedmeat soon
// ctf
MessyPoutine CTF
Pipeline exploitation challenges
View all tools →
LOTP
Living Off The Pipeline
Attack Trees
Supply Chain Attack Trees
View all KBs →
events🔥 about
$ ls -la /usr/local/bin/

Open Source Tools

Security tools and knowledge bases built by the team.

## tools

⭐ poutine

FLAGSHIP scanner

Build Pipeline Security Scanner

Detect misconfigurations and vulnerabilities in your CI/CD pipelines. Scans GitHub Actions, GitLab CI, and other build systems for security issues.

Apache-2.0 View on GitHub

bagel

RELEASED scanner

Developer Workstation Security Scanner

Open-source CLI that inventories security-relevant metadata on developer workstations. Detects credentials, misconfigurations, and exposed secrets across Git, SSH, cloud providers, and package managers.

GPL-3.0 View on GitHub

gobelin

RELEASED scanner

Go Repojacking Vulnerability Detector

Scan Go project dependencies for potential repojacking vulnerabilities. Detects missing or deleted GitHub accounts that could be hijacked by attackers.

AGPL-3.0 View on GitHub

puant

RELEASED scanner

Unicode PUA Obfuscation Detector

Tree-sitter-powered detector for malware hidden using Unicode Private Use Area characters. Catches invisible code obfuscation in JavaScript, Python, Go, and Java.

AGPL-3.0 View on GitHub

lev-calc

RELEASED analysis

LEV Vulnerability Exploitability Calculator

Calculate Likely Exploitable Vulnerability scores based on NIST CSWP 41. Predict the probability of vulnerabilities being actively exploited to prioritize patching.

Apache-2.0 View on GitHub

smokedmeat

COMING SOON offensive

Something spicy is in the smoker...

Our first offensive tool. We're excited about this one.

GPL-3.0 Coming soon
## Knowledge Bases (KBs)

LOTP

Living Off The Pipeline

CI/CD Attack Techniques Knowledge Base

Inventory of how development tools (typically CLIs), commonly used in CI/CD pipelines, have lesser-known RCE-by-design features.

Apache-2.0 Source

Attack Trees

Supply Chain Attack Trees

Deciduous-Generated Threat Models

Visual attack trees for supply chain security threats, generated using the Deciduous tool. Covers source code and build system attack scenarios aligned with SLSA.

CC-BY-SA-4.0 Source
# labs.boostsecurity.io | // supply chain security research by Boost Security
© 2026 Boost Security • Built with ❤️ in Montréal, Québec, Canada 🇨🇦
Privacy Policy · Terms of Service
We use cookies for analytics only. Privacy Policy
upcoming
NorthSec 2026
May 14-15, 2026 Montréal
→