<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Supply Chain on nstsec.com</title>
    <link>https://nstsec.com/it/tags/supply-chain/</link>
    <description>Recent content in Supply Chain on nstsec.com</description>
    <image>
      <title>nstsec.com</title>
      <url>https://nstsec.com/images/index.png</url>
      <link>https://nstsec.com/images/index.png</link>
    </image>
    <generator>Hugo</generator>
    <language>it</language>
    <lastBuildDate>Thu, 07 May 2026 21:20:00 +0200</lastBuildDate>
    <atom:link href="https://nstsec.com/it/tags/supply-chain/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>CVE-2026-44590: RCE via pull_request_target Injection &gt; Supply Chain Compromise in Sherlock</title>
      <link>https://nstsec.com/it/posts/sherlock-rce-pull-request-target-cve-2026-44590/</link>
      <pubDate>Thu, 07 May 2026 21:20:00 +0200</pubDate>
      <guid>https://nstsec.com/it/posts/sherlock-rce-pull-request-target-cve-2026-44590/</guid>
      <description>Come ho trovato una RCE via pull_request_target injection in Sherlock, salvandolo da un possibile supply chain attack</description>
    </item>
  </channel>
</rss>
