Click any tag below to further narrow down your results
Links
This article outlines how attackers can exploit self-hosted GitLab environments, particularly through instance runners. It details the steps to gain access, including hijacking runners and extracting sensitive information from repositories. The post also offers defensive measures to mitigate these risks.