Developer Workstations Are Now Part of the Software Supply Chain
Attackers are targeting developer machines to steal API keys, SSH keys, and cloud credentials. Here’s what security teams need to do to close the gap.
What’s new: Recent campaigns have targeted developer workstations as part of the software supply chain, focusing on stealing credentials such as API keys, cloud credentials, and SSH keys. This shift emphasizes the need for security teams to consider developer environments as critical components of the software supply chain, as attackers increasingly exploit these workstations to gain access to sensitive information and systems.
Who’s affected
Security teams, developers, and organizations utilizing software development environments, particularly those using npm, PyPI, and Docker Hub, are at risk due to the increased targeting of developer workstations in supply chain attacks.
What to do
- Identify and monitor credentials that can be accessed from developer workstations.
- Limit the value and lifetime of credentials stored on developer machines.
- Implement detection mechanisms for sensitive material entering Git history, CI logs, and other systems.
- Establish quick revocation and rotation processes for access when workstation compromise is suspected.
- Differentiate between low-impact local exposures and high-privilege credentials to assess risk accurately.



