ITM is an open framework - Submit your contributions now.

Insider Threat Matrix™Insider Threat Matrix™
  • ID: IF029.004
  • Created: 21st March 2026
  • Updated: 29th March 2026
  • Contributor: The ITM Team

CI/CD Pipeline Code Manipulation

A subject modifies code or configuration within continuous integration and continuous deployment (CI/CD) pipelines in a manner that alters how software is built, tested, or deployed, resulting in reduced oversight, increased risk, or unauthorized system behavior.

 

This includes changes to build scripts, deployment logic, test execution steps, or pipeline controls that enable unreviewed code to be promoted, bypass validation mechanisms, or introduce additional functionality during the build or release process.

 

Because CI/CD pipelines govern how code transitions from development to production, manipulation at this level can propagate risk at scale and bypass traditional code review controls. These changes may be subtle and embedded within pipeline configuration, making detection dependent on monitoring pipeline integrity and change history.