As organizations accelerate software delivery through CI/CD (Continuous Integration and Continuous Delivery/Deployment), the attack surface for malicious actors is also expanding. CI/CD pipelines, by their very nature, have deep access to source code, secrets, infrastructure, and production environments. A single misconfigured step or leaked credential can lead