displayName
Supply Chain Attack Simulation
workflowKind
security
triggerType
scheduled
typicalCadence
semi-annual
complexity
cross-team
description
Simulates software supply chain attack scenarios -- injecting typosquatted
packages in internal registries, testing dependency confusion defenses,
validating SLSA provenance verification, testing code-signing bypass
detection, evaluating CI pipeline compromise scenarios, and measuring
time-to-detection and response effectiveness. Produces a findings report
with remediation priorities. Excludes ongoing dependency scanning.