The presentation discusses the use of Tracy, a tool for tracing and profiling software executions, to detect and prevent supply chain attacks in DevOps workflows.
- Tracy is a tool for tracing and profiling software executions in DevOps workflows
- The tool can be used to detect and prevent supply chain attacks
- Tracy uses denial and allow lists to identify good and bad activity
- The tool extends profiles to include user ID, arguments, and environment variables
- Tracy can ignore certain system and environment variables to ensure consistency
- The tool uses syscall to collect information on executed binaries
- An anecdote is provided to illustrate how Tracy can detect a supply chain attack