In recent weeks we have seen a pattern that should require rethinking the security of the software: the attackers no longer agree to enter malicious code into packages or containers, their increasingly common goal is to stealing the credentials and tokens that allow that software to act as "trusted". Contemporary campaigns have shown that the removal of secrets from development environments and CI / CD pipelines offers a rapid and high-impact route to the handling, publication and deployment of legitimate software. This makes the developer's job a critical link in the supply chain, not just an endpoint.
This change requires a different reading of risk. Investments have traditionally focused on protecting repositories, artifacts, CI platforms and clouds; these defenses remain necessary but incomplete. The real entrance door is often the local context: cloned repositories, environment variables, terminal histories, loaded SSH agents, .env files, package manager configurations and browser sessions containing tokens or clues on where and how credentials are used.

When an attacker accesses a token or key next to the track of where it is used - a Git remote, a deployment script, a cloud profile - the simple piece of information becomes an operational map. That's why the threat is not just "malicious code" but context and credentials collection at the exact point where you trust them. The speed of automation and IA-driven assistants makes the window between discovery and exploitation extremely short.
To mitigate this risk, work is needed on several fronts and in coordination between teams: AppSec, endpoints security, identity, platform and cloud operations. That means no more friction for developers, but smart control points. Best practices include minimally privileged access control, identity-related ephemeral credentials and verification of device status before granting tokens. The adoption of models such as OIDC for CI and STS for cloud sessions reduces the value of any secret that is exposed on a local disk.
At the operational level it is essential to detect secrets before they leave the local level. Measures such as pre-commit hooks, IDE scanning, detection of pipeline secrets and policies that block commitment or automatic merges when credentials are identified reduce the surface. Early telemetry and contextual warnings are more useful than punitive reports: they point to risk and allow to correct without stopping productivity. Early detection tools should be integrated with the workflow of the developer, not replace it.
We also need to think about the protection of automatic "memory": code assistants and automation agents. Asking what they can read, what they can run and where their exits end is as important as auditioning external dependencies. To minimize leakage, it is recommended to set up policies that prevent sensitive fragments from being sent to external services, use local model instances when feasible and filter real-time prompts and logs.
The response to incidents must be as fast as possible. If a workstation commitment is suspected, the organization needs to be able to identify which credentials were usable from that machine, to revoke or rotate them automatically, and to track side use of tokens. Coordination between endpoint detection, identity revocation and cloud measurements reduces the exposure time that attackers exploit.

There are guides and frameworks that help articulate this holistic approach: the resources of agencies such as CISA provide practical guidance on supply chain risk management and incident response, and NIST publications on supply chain risk management provide frameworks for prioritizing technical and organizational controls. Consulting these materials helps to convert intuitions into repetitive policies ( https: / / www.cisa.gov / supply-chain, https: / / csrc.nist.gov / publications / detail / sp / 800-161 / rev-1 / final). In addition, practical supply chain security guides published by large suppliers collect controls applicable in real environments ( https: / / learn.microsoft.com / en-us / security / compass / software-supply-chain-security).
In practice, organizations should start by inventing which credentials reside or can be used from development stations, setting rules on their duration and privileges, deploying prior detection to commit and improving telemetry to quickly know what should be rotated. At the same time, the implementation of device-based confidence controls (postage mechanisms), strong identity authentication and minimum privilege policies in repositories and records limit damage when a leak occurs.
The operational message is clear: treat the development station as a supply chain boundary, not as one more user in the endpoints park. Changing this approach allows you to design precise controls that stop the removal of credentials and break the logic of attack where the most damage can cause. In a world where automation accelerates both delivery and exploitation, anticipating and cutting the flow of trust in origin is the most effective defense.
Related
More news on the same subject.

Safety alert Drug critical vulnerability of SQL injection in PostgreSQL requires immediate update
Drucal has published safety updates for a vulnerability qualified as "highly critical" which affects Drumal Core and allows an attacker to achieve arbitrary SQL injection in sit...

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...