Privesc
pipeleak gl renovate privesc
Inject a malicious CI/CD Job into the protected default branch abusing Renovate Bot's access
Synopsis
Inject a job into the CI/CD pipeline of the project's default branch by adding a commit (race condition) to a Renovate Bot branch, which is then auto-merged into the main branch. Assumes the Renovate Bot has owner/maintainer access whereas you only have developer access. See https://blog.compass-security.com/2025/05/renovate-keeping-your-updates-secure/
| pipeleak gl renovate privesc [flags]
|
Examples
| pipeleak gl renovate privesc --token glpat-xxxxxxxxxxx --gitlab https://gitlab.mydomain.com --repoName mygroup/myproject --renovateBranchesRegex 'renovate/.*'
|
Options
| -h, --help help for privesc
-b, --renovateBranchesRegex string The branch name regex expression to match the Renovate Bot branch names (default: 'renovate/.*') (default "renovate/.*")
-r, --repoName string The repository to target
|
Options inherited from parent commands
| --coloredLog Output the human-readable log in color (default true)
-g, --gitlab string GitLab instance URL
--json Use JSON as log output format
-l, --logfile string Log output to a file
-t, --token string GitLab API Token
-v, --verbose Verbose logging
|
SEE ALSO