The Blind Spot in Application Security
Code scanning, dependency analysis, and runtime application protection have long dominated the AppSec conversation. But in the last few years, attackers have exposed a deeper weakness—the tools and processes that build and deliver software itself. So much so that Forrester’s 2024 State of Application Security Report ranks software supply chain breaches as the #1 external attack vector—surpassing traditional software vulnerability exploits.
Compromised repositories, build pipelines, and malicious dependencies are now standard tactics in the attacker playbook. Each incident reinforces the same lesson: if attackers can poison the pipeline, they don’t need to wait for a zero-day vulnerability in the operating system or application layers.
This post explores why securing developer infrastructure is a core pillar of modern Application Security Posture Management (ASPM). Instead of merely shifting security left, Wiz Code integrates security posture management, threat detection, and risk prioritization across the entire software supply chain.
Securing Developer Infrastructure One Component at a Time
Organizations have spent years improving the security posture of their cloud environments—monitoring workloads, storage, and networking for misconfigurations. But developer environments—version control systems, CI/CD pipelines, and artifact registries—are now either cloud-hosted or deeply cloud-connected, continuously delivering software and artifacts to this environment. These systems demand the same level of security oversight to prevent misconfigurations, supply chain risks, and unauthorized access.
Wiz Code expands the scope of ASPM beyond orchestrating code scanners and correlating or prioritizing their findings. It integrates core Cloud Security Posture Management (CSPM) and Cloud Detection and Response (CDR) principles into developer environments. By continuously assessing repository configurations, branch protections, pipeline security settings, and registries, Wiz delivers a unified approach to manage risk across the entire software factory proactively.
Identities: The First (and Weakest) Link
Developer accounts hold the keys to the kingdom—access to source code, pipelines, registries, and sometimes even production systems. Yet, organizations often struggle to track who has access to what.
Wiz Code continuously maps developer identities across version control systems, identity providers, and cloud accounts, ensuring security teams know who has access, where they have it, and whether they should.
The Wiz Security Graph consolidates this identity data into a single, queryable model, making it easy to spot risky access patterns such as:
External collaborators with write access to private repositories.
Inactive users still retaining admin privileges in a codebase.
Non-member users with privileged repository access despite not belonging to any VCS organization.
Beyond human identities, Wiz also detects overprivileged service accounts—especially those provisioned by third-party GitHub Apps (e.g., CI/CD extensions, security scanners, and automation tools).
This ensures security teams understand every entity—human or machine—that can modify their codebase.
Version Control and CI/CD Systems: Where Code Becomes Software
Version control systems and CI/CD pipelines are the beating heart of the software factory. They don’t just store code—they define how it moves through development, how changes are tested, and how they reach production.
Attackers know this, so they increasingly exploit weak repository configurations and insecure CI/CD workflows to manipulate source code, exfiltrate secrets, or introduce malicious dependencies. One example is the Ultralytics PyPI attack (2024), where attackers compromised a maintainer’s repository and injected a backdoored package update into a widely used open-source library. The malware silently executed on end-user machines, stealing credentials and accessing cloud services before detection.
By ingesting repository metadata and settings, Wiz Code continuously applies prebuilt security rules to enforce access controls and prevent untrusted code from entering the pipeline. For example, this includes:
Requiring peer reviews before merging into protected branches to prevent unauthorized code changes.
Blocking force pushes to default branches to prevent the rewriting of commit history.
Requiring repositories to stay updated to reduce stale or outdated projects that could be hijacked.
Restricting self-hosted GitHub Actions and GitLab Runners to authorized repositories only.
Preventing workflows from auto-approving pull requests.
In addition, Wiz Code’s controls are mapped to a built-in framework for Code & Supply Chain Security, in addition to industry-standards, including CIS Benchmarks, OWASP TOP10 CI/CD Security Risks, and OpenSSF Source Code Management Best Practices.
Compliance reports can be generated on demand, allowing security teams to assess policy adherence for specific product teams, business units, or development environments, ensuring audit readiness at all times.
Beyond Misconfigurations–Detecting & Responding to Active Threats
Security posture management is critical, but misconfigurations alone don’t tell the full story. Organizations need to move beyond static posture checks and actively detect threats unfolding across their software supply chain—from compromised developer accounts to malicious code injections and rogue pipeline executions.
Wiz correlates security signals across all layers, combining source code management (SCM) audit logs, CI/CD activity, and runtime events to surface risks that traditional scanning tools miss.
For self-hosted VCS instances or workloads running CI runners, the Wiz Sensor can be deployed to detect suspicious activity. For instance, it can flag a CI runner making outbound requests to a known crypto-mining domain, an early indicator of compromise or unauthorized access. Wiz then ties this activity back to the originating VM and the associated GitHub repository—mapping the full attack path.
At the same time, Wiz continuously ingests and analyzes audit logs from version control systems and CI/CD platforms, surfacing real-time threats such as:
Unauthorized repository access, like a cloning operation from a suspicious IP.
Security control modifications, such as deleting a repository’s branch protection ruleset.
Privilege escalations, like the sudden provisioning of a personal access token (PAT) with admin permissions.
Misconfigurations, identity risks, and active threats don’t exist in isolation. Without a unified security model, organizations are forced to manually correlate fragmented findings across control and data planes.
The Wiz platform bridges the gap between static security posture and active threat detection by normalizing security signals across developer infrastructure, cloud environments, and runtime activity—all within the Wiz Security and Investigation Graphs. This enables real-time risk assessment, allowing security teams to focus on prioritizing and responding to threats–without needing to manually stream, store, or correlate signals across various systems and planes.
Artifact Registries: The Final Stop Before Deployment
By the time software is pulled from a container registry or package repository, it’s often assumed to be safe. However, history has shown that trusted artifacts can still be tampered with.
In December 2024, attackers compromised Kong’s DockerHub registry account and published a malicious Docker image containing a cryptominer—affecting version 3.4.0 of the Kong Ingress Controller. This incident underscores the reality that supply chain security doesn’t stop at CI/CD—organizations must also protect their artifact registries.
Wiz helps harden registries and their artifacts by detecting:
Repositories storing container images that contain plaintext credentials or cleartext SAS tokens–leading to lateral movement.
Container repositories that allow unrestricted overwrites, enabling any user to replace or modify images used to build containers with high privileges.
Additionally, Wiz integrates directly into the software delivery pipeline by enabling container image signing during the build process (via the WizCLI) and verifying signatures before deployment using the Wiz Admission Controller. This ensures that only trusted, verified container images can be deployed into Kubernetes clusters.
Get Started with Wiz Code And Secure Your Software Delivery Pipeline from the Inside Out
Instead of relying on one-off manual reviews, security teams can now leverage Wiz Code to ensure the security of and around their organization’s software delivery pipeline. By connecting repositories, CI/CD pipelines, and registries to Wiz, teams gain continuous enforcement of security best practices and real-time detection of risks across developer environments—without disrupting engineering workflows.
To learn more, explore the latest Wiz Code documentation and release notes (requires login) or request a live demo.