AI-Powered Application Penetration Testing—Scale Security Without Compromise Learn More

VS Code Supply Chain Attack, Microsoft Exchange Zero-Day, and AI-Accelerated Vulnerability Discovery

This episode explores how attackers exploit infrastructure that became load-bearing before anyone secured it from a malicious VS Code extension that compromised thousands of GitHub repositories and an actively exploited Exchange zero-day, to Cisco SD-WAN auth bypasses, AI chaining low-severity bugs into real attack paths, and AWS GovCloud credentials left exposed in a public repo.

When the Infrastructure Becomes the Target

Four stories this week, one thread: attackers aren't breaking in so much as inheriting access through developer machines, identity-adjacent platforms, AI-accelerated discovery, and credentials left in plain sight. Here's what stood out from the operator chair.

The most valuable trust boundary isn't the pipeline. It's the person feeding it. A malicious VS Code extension compromised roughly 3,800 GitHub repositories after one developer installed it, handing attackers legitimate credentials rather than a system to breach. GitHub linked the campaign to Team PCP, the same group behind the recent MiniCly/HALUD supply chain attack. The detection problem: a skilled developer doing normal work looks nearly identical to an attacker riding stolen credentials. Same repos, same access patterns, same timing. We keep adding surfaces where untrusted code executes without matching the vetting bar to the access those surfaces grant.

Disclosure-to-exploit is a gap that's getting harder to defend across. Microsoft led with Exchange Emergency Mitigation Service guidance for an on-prem Exchange zero-day already being actively exploited before the patch shipped. Exchange keeps appearing because it's not just email. It's password resets, identity flows, legal hold archives, the organization's institutional memory. By the time public disclosure exists, someone has already been scanning for it. Mitigation-before-patch is increasingly the new normal, and that window between attacker awareness and defender awareness is the real vulnerability.

Inside the network fabric, there's no EDR to catch you. Cisco patched a second actively exploited authentication bypass in Catalyst SD-WAN in a short window: unauthenticated, high privilege, arbitrary config changes across the fabric. Rapid7 noted infrastructure overlap with ORB networks linked to China-nexus espionage. SD-WAN is a consistent target because tooling inside the fabric is thin, few people outside the network team understand what normal looks like, and IR on that infrastructure requires specialized knowledge most teams don't carry. Dwell time goes up by default.

AI is compressing both sides of the vuln discovery timeline. Palo Alto researchers using Anthropic and OpenAI models found 75 real vulnerabilities across 130+ products in a month, seven times their normal rate, with models capable of chaining low-severity findings into realistic attack paths. The same week, Google disrupted what appears to be the first confirmed AI-assisted zero-day built for real deployment, fingerprinted by hallucinated CVSS scores and educational-style comments in the exploit code. Discovery and weaponization are both accelerating. Low and medium findings that used to sit in the backlog now chain into critical paths faster than remediation cycles can absorb. B-team operators are producing A-team output.

Credentials in a public repo don't require an exploit chain. A CISA contractor exposed highly privileged AWS GovCloud credentials, plaintext passwords, and internal deployment tokens in a public GitHub repo, valid for roughly 48 hours after disclosure. No exploit required; just a search. The root cause was a disabled default security control, turned off for convenience. Policy and practice diverged, and the gap was the vulnerability. Security posture is what the paperwork says. Security reality is what the admin actually configured.

The takeaway. Policy is what you wrote down. Practice is what's actually running. The attackers already know the difference.

Security Headlines:


Sean McMillan Headshot

About the speaker, Sean McMillan

Community Manager

Sean McMillan is Community Manager at Bishop Fox, focused on making complex security topics easier to understand and more interesting to follow. He holds a bachelor’s degree in Mass Communication and Media Studies from Arizona State University and brings over a decade of experience in podcasting, live hosting, and audience engagement. As host of Initial Access, he works with practitioners to explore how real-world attacks actually happen.


Shad Malloy Headshot

About the speaker, Shad Malloy

Managing Senior Consultant II

Shad Malloy is a Managing Senior Consultant II at Bishop Fox focused on network penetration testing, vulnerability risk management, and application security. He has advised multiple industries including health care, financial services, energy, and technology. In addition to time working and managing security for education, health care, and national government agencies. Shad holds a Bachelor of Science in Computer Information Systems as well as industry certifications like the CISSP.


Emilio Gallegos Bio Image

About the speaker, Emilio Gallegos

Adversarial Operator II

Emilio Galle is an offensive security researcher and adversarial operator II at Bishop Fox. He specializes in application security and vulnerability discovery, earning notable recognition on the Apple Web Server Security Acknowledgements list and discovering CVE-2026-25087, a denial-of-service vulnerability in Apache Arrow.

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.