top of page

InvisiRisk Blog Posts


Why the AWS CodeBreach Vulnerability Is a Reminder We Can’t Ignore
Vulnerabilities are inevitable, but a successful breach doesn't have to be. We aren't just scanning known vulnerabilities; we are ensuring that even if an attacker finds a way into your build system, they cannot get your data out.

Eric Pulaski
Jan 193 min read


Shai-Hulud Worm Reloaded: A New Wave of NPM Supply Chain Attacks and How InvisiRisk Stops It
Between November 21-23, the Shai-Hulud worm returned in a more aggressive form, rapidly spreading through the NPM ecosystem and Maven, compromising tens of thousands of repositories. InvisiRisk Build Application Firewall (BAF) includes a robust set of default security policies that enforce expected build behavior. The "Unauthorized PUT" policy serves as a critical defense against attacks like Shai-Hulud.

Pranesh Shrestha
Dec 2, 20254 min read


The 's1ngularity' Attack: Weaponizing AI CLI Tools and How InvisiRisk Stops It
The nx 's1ngularity' attack is a powerful reminder that supply chain security requires more than just scanning dependencies. InvisiRisk provides the proactive, real-time defense needed to secure the modern software development lifecycle.

Pranesh Shrestha
Oct 21, 20256 min read


Shai-Hulud NPM Worm Attack: Overview and InvisiRisk Protection
InvisiRisk’s BAF enforces defensive rules in the build pipeline (trusted registries/SCM, blocked packages, secret-leak prevention, response checks, git protections), and the Build Security AI Agent feature provides behavioral detection for novel, suspected worm-style activities. The defensive rules and the agent work together to stop supply-chain worms and credential-theft campaigns from spreading through your builds.

Pranesh Shrestha
Sep 25, 20255 min read


The Great NPM Heist – What Happened and How InvisiRisk Protects You
Integrating InvisiRisk Build Application Firewall into your development workflow is a practical way to ensure that even if attackers try to slip malware into NPM or Git, your build process will catch it and shut it down before any damage is done.

Pranesh Shrestha
Sep 19, 20256 min read


Git's Silent Takeover: How a Simple Clone Command Can Compromise Your Entire System
This post breaks down how this attack works, it’s devastating potential, and demonstrates how InvisiRisk's Build Application Firewall (BAF) provides a crucial, proactive defense by preventing the use of vulnerable GIT versions before they can be exploited.

Pranesh Shrestha
Sep 9, 20254 min read


GitHub's 'Pwn Request' misconfiguration: How InvisiRisk BAF Shields Your CI/CD from Hidden Threats
The dynamic nature of CI/CD pipelines necessitates a solution that can identify and block threats as they happen. InvisiRisk BAF acts as a vigilant guardian for your build process, ensuring that even if a vulnerability is present, it cannot be successfully exploited. By shifting from a reactive to a proactive security model, you can confidently leverage the power of automation without compromising the integrity of your software supply chain.

InvisiRisk, Inc.
Jul 14, 20255 min read


Why Your Secrets Faucet is Still Leaking
InvisiRisk BAF is an advanced security platform that strengthens software build processes against supply chain threats. It offers real-time defense by applying default security policies that block known vulnerabilities, ensure the use of trusted sources, and restrict unauthorized activities during builds.

InvisiRisk, Inc.
Apr 30, 20253 min read


Don't Let a Typo Sink Your Ship: How InvisiRisk BAF Fights The Silent Threat of Typosquatting
Typosquatting attacks are a silent but significant threat in the software supply chain. Relying solely on manual vigilance is no longer sufficient. Our Build Application Firewall (BAF) is designed with a robust set of default security policies to protect your applications from various vulnerabilities.

InvisiRisk, Inc.
Apr 17, 20254 min read


Could Standard Security Attestations, Powered by InvisiRisk, Have Shielded the NHS supplier from the £3m ICO Fine?
The ICO fine levied against , Advanced Computer Software Group Ltd, serves as a stark reminder of the importance of supply chain security.

InvisiRisk, Inc.
Apr 3, 20252 min read


CVE-2025-29927: Middleware Authorization Bypass in Next.js and How InvisiRisk BAF Prevents it
InvisiRisk BAF’s layered, real-time security stops attacks like the Ultralytics/Action Compromise

InvisiRisk, Inc.
Apr 1, 20253 min read


How InvisiRisk BAF Effectively Mitigates GitHub Actions Supply Chain Attacks Like the Ultralytics/Action Compromise
InvisiRisk BAF’s layered, real-time security stops attacks like the Ultralytics/Action Compromise

InvisiRisk, Inc.
Mar 27, 20254 min read


In-Depth Analysis: How InvisiRisk BAF Effectively Mitigates GitHub Actions Supply Chain Attacks Like the tj-actions/changed-files Compromise (CVE-2025-30066)
InvisiRisk BAF is a security solution specifically designed to protect the software build process from various threats.

InvisiRisk, Inc.
Mar 26, 20254 min read


Ensuring Software Supply Chain Security with Blessed Open-Source Repositories
The use of blessed open-source repositories, coupled with robust policy enforcement through BAF, is essential.

InvisiRisk, Inc.
Mar 11, 20252 min read
bottom of page