A deep dive into CI/CD post-exploitation, OIDC identity interception, and recursive exfiltration mechanics.