CI/CD privilege escalation is not an edge case. It is a structural weak point. Modern pipelines connect build, test, and deploy stages across multiple systems. Each step holds credentials — API keys, SSH keys, cloud access tokens. When these secrets are exposed or misconfigured, attackers can jump privileges, move laterally, and take control of production.
The most common path is over-permission. Service accounts and pipeline runners often have broader access than needed. Attackers who compromise a build agent can use these permissions to push malicious code, alter artifacts, or harvest secrets stored in environment variables. Even read-only access in one environment can turn into admin rights elsewhere.
Another vector is poisoned dependencies and build scripts. If a pipeline pulls code or packages without strict integrity checks, a compromised dependency can execute within a privileged environment. This allows silent privilege escalation inside the CI/CD system before anyone notices.
Misconfigured caching and artifact storage are also frequent sources of breaches. Shared caches without proper isolation can leak data between builds. Staging credentials in build logs — accessible to anyone with read permissions — hand attackers the tools they need.