76 Poisoned Tags in 12 Days: Pipeline Nightmares from March 2026
Imagine running your trusted vulnerability scanner—only for it to steal your cloud keys. That's what hit four open-source tools in March 2026, all via pipelines.
theAIcatchupApr 07, 20263 min read
⚡ Key Takeaways
Pin dependencies and actions to immutable SHAs, not mutable tags.𝕏
Verify integrity with checksums and signatures before execution.𝕏
Centralized policy enforcement can detect anomalies early—but test it yourself.𝕏
The 60-Second TL;DR
Pin dependencies and actions to immutable SHAs, not mutable tags.
Verify integrity with checksums and signatures before execution.
Centralized policy enforcement can detect anomalies early—but test it yourself.