Case 13: Build-Time File Tampering (Runtime)

Case 13: Build-Time File Tampering (Runtime) #

Target Files #

Vulnerability Overview #

This scenario simulates the SolarWinds SUNSPOT attack. During the build process (e.g., npm install), a compromised package tampers with source code or build artifacts. The workflow YAML itself appears normal — tampering occurs inside the build tool, invisible to code review or file diffs.

Why Out of Scope #

Build-time file tampering is a runtime problem. Tampering occurs inside npm package postinstall scripts, not in the workflow YAML. Static analysis of workflow files cannot detect this.

Indirect Mitigation by sisakulint #

  • commit-sha: Pinning dependency actions
  • artipacked: Preventing credential persistence
  • harden-runner file monitoring to detect file modifications during build
  • SLSA framework for build artifact provenance
  • Reproducible builds

Verdict: OUT OF SCOPE (Runtime Security) #