May I CI your GCP access token?

A lot of research has been conducted on attacking CI systems for gaining information or access to the infrastructure of targets. Some of the most interesting articles on this topic are:

Read More