2. of Tampering (2022 deck) IV
An attacker can modify your build system and produce signed builds of your software:
Threat |
|
You’re using an open source third-party library and an attacker modifies the library and uploads it to the public repository, which, when downloaded, compromises your build environment. |
|
CAPEC |
CAPEC-678: System Build Data Maliciously Altered CAPEC-445: Malicious Logic Insertion into Product Software via Configuration Management Manipulation CAPEC-670: Software Development Tools Maliciously Altered CAPEC-511: Infiltration of Software Development Environment CAPEC-538: Open-Source Library Manipulation |
ASVS |
10.2.1: Ensure the source code doesn’t contain a phone home mechanism 10.2.3: Ensure the source code... |