pentest-supply-chain

Software supply chain security — dependency confusion, CI/CD pipeline attacks, lockfile integrity, and build artifact verification.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "pentest-supply-chain" with this command: npx skills add jd-opensource/joysafeter/jd-opensource-joysafeter-pentest-supply-chain

Pentest Supply Chain

Purpose

Supply chain attacks (SolarWinds, Log4Shell, xz-utils) are the fastest-growing threat category. Shannon explicitly excludes "vulnerable third-party libraries." MITRE ATT&CK T1195 has zero coverage in any existing skill.

Prerequisites

Authorization Requirements

  • Written authorization with supply chain testing scope
  • Repository access for dependency and CI/CD analysis
  • Registry awareness — confirm which private registries are in use
  • Build system access for pipeline review (if white-box)

Environment Setup

  • Snyk CLI for dependency vulnerability scanning
  • npm audit / pip-audit for ecosystem-specific checks
  • Trivy for container and filesystem scanning
  • socket.dev for dependency risk analysis

Core Workflow

  1. Dependency Audit: Analyze package.json/requirements.txt/go.mod for known vulnerable versions, unmaintained packages, suspicious dependencies.
  2. Dependency Confusion: Check if internal package names can be claimed on public registries (npm, PyPI). Test namespace squatting.
  3. CI/CD Pipeline Security: Review GitHub Actions/GitLab CI for injection via PR titles/branch names, secrets in logs, unpinned action versions, runner escape.
  4. Build Artifact Integrity: Verify signatures on containers/packages, check for unsigned artifacts, test image tag mutability.
  5. Lockfile Integrity: Detect lockfile injection (manipulated resolved URLs), verify lockfile-to-manifest consistency.
  6. Install Script Abuse: Identify packages with install hooks executing arbitrary code, test typosquatting candidates.
  7. SBOM Generation: Generate Software Bill of Materials and map transitive dependency risk with CVE correlation.

Tool Categories

CategoryToolsPurpose
Dependency ScanningSnyk, npm audit, pip-auditKnown CVE detection
Container ScanningTrivy, GrypeImage vulnerability analysis
Dependency Risksocket.dev, SemgrepBehavioral risk analysis
CI/CD Reviewcustom scripts, actionlintPipeline security audit
SBOMsyft, cyclonedx-cliBill of materials generation

References

  • references/tools.md - Tool function signatures and parameters
  • references/workflows.md - Attack pattern definitions and test vectors

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

pentest-ai-llm-security

No summary provided by upstream source.

Repository SourceNeeds Review
General

pentest-mobile-app

No summary provided by upstream source.

Repository SourceNeeds Review
General

pentest-osint-recon

No summary provided by upstream source.

Repository SourceNeeds Review