Reflections on trusting plugins: Backdooring Jenkins builds
In this post we explore how an attacker who has compromised a Jenkins instance can backdoor software built with it and what security measures are critical to ensure protection against attacks.