Thursday 

Room 2 

11:40 - 12:40 

(UTC+01

Talk (60 min)

Hijacking Google’s CI/CD Through Prompt Injection: The New Era of AI-Based Exploits

Prompt injection has long been treated as an amusing quirk of large language models, a curiosity demonstrated through simplistic examples like “ignore previous instructions.” Those surface-level attacks have been largely addressed, and with that, much of the security community moved on.

Application Security
Architecture
DevOps
Supply Chain
Testing

But the real risk was never about tricking chatbots.

As AI systems become embedded into CI/CD pipelines, build tooling, automation frameworks, and production infrastructure, prompt injection evolves from a toy problem into a true security vulnerability. When AI agents are granted access to privileged tools, shell commands, GitHub/GitLab tokens, issue editing, code generation, untrusted text becomes an execution vector.
Aikido Security recently uncovered a critical, widespread vulnerability pattern inside GitHub Actions workflows used by multiple Fortune 500 companies, including Google, where prompt injection enabled unauthorized command execution and credential exfiltration directly from their pipelines. These were not hypothetical weaknesses: the attacks were reproduced in controlled environments and confirmed by affected companies.

This talk examines why prompt injection becomes fundamentally dangerous when AI agents act inside trusted automation systems, and why solving it is far harder than filtering keywords or blocking certain phrases. We will draw parallels to SQL injection, another vulnerability once thought “solved”, and explore how we can protect ourselves against this new classification threat.

Mackenzie Jackson

Mackenzie is a developer advocate with a passion for DevOps and code security. As the co-founder and former CTO of a health tech startup, he learnt first-hand how critical it is to build secure applications with robust developer operations.
Today as the Developer Advocate at GitGuardian, Mackenzie is able to share his passion for code security with developers and works closely with research teams to show how malicious actors discover and exploit vulnerabilities in code.