CI/CD Goat Logo

CI/CD Goat

0
Free
1 saves
Updated 11 March 2025
Visit Website

The CI/CD Goat project allows engineers and security practitioners to learn and practice CI/CD security through a set of 11 challenges, enacted against a real, full blown CI/CD environment. The scenarios are of varying difficulty levels, with each scenario focusing on one primary attack vector. The challenges cover the Top 10 CI/CD Security Risks, including Insufficient Flow Control Mechanisms, PPE (Poisoned Pipeline Execution), Dependency Chain Abuse, PBAC (Pipeline-Based Access Controls), and more. The different challenges are inspired by Alice in Wonderland, each one is themed as a different character. The project’s environment is based on Docker containers and can be run locally. These containers are: Gitea (minimal git server), Jenkins, Jenkins agent, LocalStack (cloud service emulator that runs in a single container), and Prod (contains Docker in Docker and Lighttpd service).

FEATURES

EXPLORE BY TAGS

SIMILAR TOOLS

A comprehensive guide to Nessus, a vulnerability scanner, covering data directories, binary directories, logs directories, plugin directories, advanced settings, API, and good practices.

A comprehensive cybersecurity resource for learning and education

INE Security offers a range of cybersecurity certifications, including penetration testing, mobile and web application security, and incident response.

A network of physical and online cyber warfare ranges for training and testing

An annual jeopardy-style capture-the-flag contest with challenges related to cybersecurity.

A comprehensive guide to Python 3 syntax, features, and resources in a single image.

Archive of information, tools, and references regarding CTF competitions.

A repository of CTF challenges and resources from various cybersecurity competitions.

Comprehensive endpoint protection platform providing unified visibility and security for cloud workloads, endpoints, and containers.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

Copyright © 2025 - All rights reserved