Integrity failures occur when code or infrastructure doesn't protect against unauthorized modifications. This includes insecure CI/CD pipelines, unsigned updates, insecure deserialization, and trusting data without verification.
Compromising build systems to inject malicious code
Exploiting object deserialization for RCE
Distributing malicious updates without verification
Modifying code without detection
Injecting backdoors during compilation
Unauthorized modification of critical data
Attackers compromised the build system to inject malware into software updates, affecting 18,000+ organizations.
CI/CD tool compromise exposed environment variables and secrets from thousands of repositories.
Built by an OWASP Member • Part of the OWASP Web Security Lab Series