Supply Chain Compromise: The Anatomy of the Attack and the Blueprint for Defense

By: Niek Palm
The modern software supply chain is under assault, with the developer environment and CI/CD pipeline forming the critical, most privileged target. The Shai Hulud 2.0 NPM worm demonstrated this perfectly: by backdooring over 700 popular packages and exploiting developer and CI/CD systems across platforms like GitHub, GitLab, and Jenkins, this highly automated worm exfiltrated over 33,000 unique secrets and created over 25,000 public repositories to dump stolen credentials.
This talk dissects the anatomy of the breach to reveal the universal attack patterns, such as context injection, dependency confusion, and sophisticated secret exfiltration via high-privilege automation. You will learn the defensive principles that contain your blast radius: implementing strict Least Privilege policies, enforcing a Zero-Trust dependency model (using integrity checks and pinning), and transforming static secrets into ephemeral, just-in-time credentials.
After this talk, you will recognize the bad practices that enable these compromises, understand how to prevent your pipeline from getting hacked, and extend your security toolbox with automated checks to enforce these universal principles.