Welcome to The Cloud-Native Digest, a monthly roundup of the latest in artifact management, the software supply chain, and open source.
View in browser
DIGEST_Newsletter-Banner_10

Welcome to The Cloud-Native Digest, a monthly roundup of the latest in artifact management, the software supply chain, and open source. Let’s dive in!

VULN ROUND UP 

 

Common Vulnerabilities & Exposures

SharePoint ToolShell exploit chain
NIST: CVE-2025-53770

A CVSS 9.8 RCE in on-prem SharePoint stems from insecure deserialization via the /ToolPane.aspx endpoint. Attackers can gain lateral access and persist via web shells like spinstall0.aspx. SharePoint Online is unaffected. If you believe you were impacted, please read the SANS breakdown on what to do next.

 

CrushFTP authentication bypass
NIST: CVE-2025-54309
CrushFTP versions 10 (before 10.8.5) and 11 (before 11.3.4_23) have a critical authentication bypass vulnerability (CVSS 9.8) that allows unauthenticated remote attackers to gain administrative access over HTTPS if DMZ proxy functionality is not enabled. Users should promptly upgrade to versions 11.3.4_26 or 10.8.5_12, restrict admin access to trusted IPs, enable DMZ proxy features, and monitor for suspicious activity. For a full breakdown of the CVE, check out the Huntress Blog.

 

AI agent intercepts critical SQLite security flaw

NIST: CVE-2025-6965

The AI agent known as Big Sleep has surpassed expectations by uncovering several real-world security threats. This marks what may be the first instance of an AI system actively disrupting a live attempt to exploit a security flaw. More details are available on the Google Blog.

 

NVIDIAScape vulnerability identified by Wiz

NIST: CVE-2025-23266

A critical flaw (CVSS score: 9.0) has been found in the NVIDIA Container Toolkit (version 1.17.7 and earlier) affecting all supported platforms. If exploited, this vulnerability could result in privilege escalation, data manipulation, unauthorized data access, or denial-of-service conditions. For further details, read the Wiz Blog.

IN THE NEWS

 

CI/CD Security

Fake npm website used to push malware via stolen token
Source: HackRead

A phishing campaign has compromised several popular npm packages, including eslint-config-prettier, by tricking a maintainer with a fake login page on a lookalike domain (npms.com). Four affected versions contained an install script targeting Windows, attempting to execute arbitrary code via a node-gyp.dll file. Security researchers rated the issue a 7.5 CVSS score and are tracking it under CVE-2025-54313.

 

Amazon Q’s vs code extension injected with ‘wiper’ prompt
Source: SC Media

Amazon Web Services’ Amazon Q extension for VS Code was reportedly compromised last week with a wiper-style prompt injection by a hacker. The attacker claimed to have submitted a pull request to the aws-toolkit-vscode GitHub repo on July 13, 2025, and was then granted admin access, allowing them to insert the malicious code into the official Amazon Q 1.84.0 release on July 17. The extension has been installed over 964,000 times from the Marketplace.

 

Critical access bypass flaw found in AI-powered Base44 platform
Source: The Hacker News

Wiz security researchers uncovered a critical vulnerability in Base44, an AI-driven vibe coding platform, that allowed attackers to bypass all authentication, including SSO, by exploiting exposed registration and email verification endpoints using a non-secret “app_id.” The discovery highlights new security risks in emerging AI coding tools that traditional defenses may overlook.

 

OWASP top 10 for CI/CD security blog series
Source: Cloudsmith

This marks the final entry in our 10-part series on the OWASP Top 10 for CI/CD security risks. While production environments often benefit from rigorous hardening, logging and observability, in CI/CD pipelines this often remains critically under-addressed, despite being a key focus of OWASP. In this post, we unpack the security risks posed by insufficient logging in CI/CD environments, why it matters, and how you can strengthen your defenses.

Kubernetes

Kubernetes 1.34 release notes
Source: Cloudsmith 

Kubernetes v1.34 is set to release in August 2025, and the Cloudsmith team has shared a helpful overview of its key updates. Notable features include a new KYAML output format for kubectl [alpha], which is a stricter, Kubernetes-specific YAML variant, and the ability to set any FQDN as a Pod’s hostname [alpha]. Other alpha additions include graceful leader transitions, enabling smoother leadership handovers without restarts. Advancing to beta are direct OCI image volume mounts, CEL-based mutating admission policies, and VolumeGroupSnapshot support. Stable features include structured parameters for Dynamic Resource Allocation (DRA) and relaxed DNS search string validation.

 

Kubernetes introduces post-quantum support for TLS
Source: Kubernetes blog

Quantum computing is poised to bring significant changes to the field of cryptography. Explore how PQC intersects with TLS and examine its relevance within the Kubernetes landscape.

 

Broadcom to discontinue free Bitnami Helm charts
Source: Broadcom Newsroom

Starting August 28, 2025, Bitnami will transition most of its public container images to a legacy repository that will no longer receive updates. If your Kubernetes workloads currently depend on Bitnami images, especially if you're not exclusively using the "latest" tags or main branches, you should begin evaluating paid plans or alternative sources for your Helm chart images.

 

From golden paths to guardrails, platform engineering's role in developer velocity
Source: Computer Weekly

In the early days of DevOps, the focus was on culture shifts and tools like IaC scripts, CI/CD automation, and Kubernetes, which only partly addressed developer challenges. Developers often ended up overwhelmed by YAML configurations, cloud documentation, and security concerns. Platform engineering changes this by prioritizing a better developer experience and streamlined deployment through Internal Developer Platforms (IDPs). The best platform teams view abstraction as a service, not a mandate, with tools like Backstage standardizing repetitive tasks into self-service experiences, “offering a paved road instead of asking everyone to bushwhack their own trail” - Chris Aniszczyk, CTO of the CNCF.

AI, MLLs & MCP

OWASP launches agentic AI security guidance
Source: InfoSecurity Magazine

The OWASP Agentic AI Security Guidance differs from existing efforts such as the OWASP Top 10 for LLMs by focusing specifically on securing those autonomous, tool-using AI agents. While OWASP for LLMs serves its purpose in highlighting the most common risks associated with LLMs from a technical perspective, this expanded guidance is needed because agentic AI introduces novel risks, like unsupervised decision-making and dynamic tool usage that could potentially lead to data loss.

 

Hugging Face partners with tech giants to simplify open-source AI deployment
Source: Silicon Republic

Hugging Face has joined forces with major tech players like AWS and Google to introduce a new open-source solution aimed at streamlining AI app development. The offering, known as HUGS, is designed to eliminate the need for complex setup. In a recent blog post, Hugging Face noted that developers often struggle with the technical challenges of optimizing inference workloads for large language models (LLMs) across different GPUs or AI accelerators. HUGS addresses this by delivering high-performance deployments of leading open LLMs with no manual configuration. Each deployment setup is pre-tested and maintained to function seamlessly from the start.

 

Cloudsmith is experimenting in MCP-Driven package management
Source: Cloudsmith

Cloudsmith announced a proof-of-concept integration of MCP to connect Claude directly to the software supply chain, enabling management of software packages, policies, and workflows entirely through natural language. Examples include commands like promoting packages that pass specific security policies, showing the most downloaded artifacts, or creating policies to block outdated packages from production.  

 

Gmail message used to trigger code execution in Claude and Bypass Protections
Source: Cybersecurity News

AI assistant systems can be exploited through a carefully crafted Gmail message that triggers code execution in Claude Desktop while bypassing its built-in protections. This attack leverages vulnerabilities in the MCP ecosystem, where individual components such as Gmail, Claude Desktop, and Shell execution are secure when operating alone but create significant security risks when chained together. Notably, the attack succeeded not by exploiting a single flaw but through the interaction of these trusted components. Intriguingly, Claude itself analysed the failed attacks and proposed improvements, acting both as a target and inadvertent facilitator of the compromise.

COMMUNITY

 

Events & Meet-ups

Unlocking Software Integrity: Native Signing & Policy Enforcement

Date/Time: August 20 @ 1:00PM EST

Location: Virtual

Secure your CI/CD pipeline with Cloudsmith and Chainguard. This session will show you how to embed native artifact signing and enforce security policies within your workflows.

 

Open Source Summit Europe

Date/Time: August 27 @ 16:20–17:00 CEST

Location: Amsterdam

Nigel Douglas will discuss how Cloudsmith integrates open-source technologies such as OPA & Trivy with additional vulnerability signals such as EPSS for a comprehensive vulnerability management strategy around software artifacts.

 

Star Wars: The Force Awakens - Rooftop Cinema Family Event

Date/Time: August 30 @ 3:00 PM | Film: 3:30PM BST

Location: London

Join us for a free rooftop screening of Star Wars: The Force Awakens at the stunning Rooftop Film Club, Stratford in London. It’s our way of saying thanks to the community and creating a fun, memorable send-off to the summer.

Signed, sealed, and delivered—see you next issue,

Nigel Douglas

Nigel Douglas

Head of Developer Relations

Cloudsmith

Cloudsmith, 7 Donegall Square West, Belfast, Northern Ireland BT1 6JH

Unsubscribe Manage preferences

LinkedIn
X
Instagram
Website