Tracebit Community Edition
GitHub App
Tracebit Community Edition
GitHub App
Tracebit Community Edition helps developers detect intrusions and supply-chain attacks across their GitHub workflows and pipelines using canary credentials.
Pinning actions and hardening runners reduces your attack surface, but it doesn't tell you when a trusted dependency turns hostile. Recent campaigns like TeamPCP (Trivy, KICS, LiteLLM, Telnyx) showed how stolen credentials from one victim become the attack surface for the next. Community Edition gives you a detective control for exactly that scenario.
How it works
- At the start of your workflow, the action calls the Tracebit API to issue short-lived canary AWS credentials and SSH keys.
- Those credentials are written to
~/.aws/credentials,~/.ssh, exported as environment variables, and held in runner process memory, covering every common exfiltration surface. - Tracebit watches for any use of those credentials. If they're touched, you get an alert with the repo, workflow, job, commit SHA, run ID, attacker IP, user-agent, and the underlying CloudTrail logs.
Why it's high-signal
Canary credentials have no permissions, so any API call is the signal. No tuning, no heuristics, no false positives from legitimate developer activity.
Get started
Free for up to 10 GitHub repos. A few minutes to add to a workflow. Sign up →
Read the full write-up: detecting CI/CD supply-chain attacks with canary credentials →
Developer
Tracebit Community Edition is provided by a third-party and is governed by separate terms of service, privacy policy, and support documentation.
Report abuse