This week's articles
Leaking Secrets From GitHub Actions
Different areas that could help leaking secrets from GitHub Actions workflows vulnerable to command injection: reading files and environment variables, intercepting network/process communication, and dumping memory.
Crane: Uber's Next-Gen Infrastructure Stack
Post examining the original motivation and some key features behind Uber's been multi-year journey to reimagine their infrastructure stack for a hybrid, multi-cloud world.
AWS CloudTrail vulnerability: Undocumented API allows CloudTrail bypass
The Datadog Security Research Team identified a method to bypass CloudTrail logging for specific IAM API requests via undocumented APIs. This technique would allow an adversary to perform reconnaissance activities in the IAM service after gaining a foothold in an AWS account, without leaving any trace of their actions in CloudTrail.