From 0a2ff79e417333a7be80e2806baa1f011f3d8a8c Mon Sep 17 00:00:00 2001 From: Carlos Polop Date: Tue, 31 Dec 2024 17:40:01 +0100 Subject: [PATCH] translation test --- .github/pull_request_template.md | 1 + .../ansible-tower-awx-automation-controller-security.md | 1 + src/pentesting-ci-cd/atlantis-security.md | 1 + src/pentesting-ci-cd/circleci-security.md | 1 + src/pentesting-ci-cd/pentesting-ci-cd-methodology.md | 1 + 5 files changed, 5 insertions(+) diff --git a/.github/pull_request_template.md b/.github/pull_request_template.md index c574644889..e87f982fcb 100644 --- a/.github/pull_request_template.md +++ b/.github/pull_request_template.md @@ -10,3 +10,4 @@ Also, remember that grammar/syntax fixes won't be accepted for the exam flag red In any case, thanks for contributing to HackTricks! + diff --git a/src/pentesting-ci-cd/ansible-tower-awx-automation-controller-security.md b/src/pentesting-ci-cd/ansible-tower-awx-automation-controller-security.md index db07fc2865..2ca5c8656d 100644 --- a/src/pentesting-ci-cd/ansible-tower-awx-automation-controller-security.md +++ b/src/pentesting-ci-cd/ansible-tower-awx-automation-controller-security.md @@ -137,3 +137,4 @@ From a **white box security** review, you would need the **System Auditor role** {{#include ../banners/hacktricks-training.md}} + diff --git a/src/pentesting-ci-cd/atlantis-security.md b/src/pentesting-ci-cd/atlantis-security.md index 3143cd6944..ff16a93c94 100644 --- a/src/pentesting-ci-cd/atlantis-security.md +++ b/src/pentesting-ci-cd/atlantis-security.md @@ -386,3 +386,4 @@ You can also pass these as environment variables `ATLANTIS_WEB_BASIC_AUTH=true` - [**https://www.runatlantis.io/docs/provider-credentials.html**](https://www.runatlantis.io/docs/provider-credentials.html) {{#include ../banners/hacktricks-training.md}} + diff --git a/src/pentesting-ci-cd/circleci-security.md b/src/pentesting-ci-cd/circleci-security.md index 4d9e161f15..dce70674b3 100644 --- a/src/pentesting-ci-cd/circleci-security.md +++ b/src/pentesting-ci-cd/circleci-security.md @@ -253,3 +253,4 @@ jobs: - You can find a **command injection vulnerability** in some task and **inject commands** via a **secret** modifying its value {{#include ../banners/hacktricks-training.md}} + diff --git a/src/pentesting-ci-cd/pentesting-ci-cd-methodology.md b/src/pentesting-ci-cd/pentesting-ci-cd-methodology.md index 1fb5c1428d..2481ffb1f5 100644 --- a/src/pentesting-ci-cd/pentesting-ci-cd-methodology.md +++ b/src/pentesting-ci-cd/pentesting-ci-cd-methodology.md @@ -102,3 +102,4 @@ Check this interesting article about the top 10 CI/CD risks according to Cider: - [https://www.cidersecurity.io/blog/research/ppe-poisoned-pipeline-execution/?utm_source=github\&utm_medium=github_page\&utm_campaign=ci%2fcd%20goat_060422](https://www.cidersecurity.io/blog/research/ppe-poisoned-pipeline-execution/?utm_source=github&utm_medium=github_page&utm_campaign=ci%2fcd%20goat_060422) {{#include ../banners/hacktricks-training.md}} +