Secure CI CD in 2026: Provenance, Signing, and the Pipeline as a Threat Model
If you run CI CD the same way you did a few years ago, you are probably shipping faster than ever and also trusting more invisible machinery than ever. The pipeline is now part of your threat model. T
mauriziomorri.hashnode.dev3 min read