The CI/CD Graph – An Attacker’s Perspective