Trace to Triage: How to Connect Product Vulnerabilities to Security Paths
This talk demonstrates how to leverage observability data, specifically distributed tracing and profiling, to improve the triage and investigation of security vulnerabilities. It focuses on using runtime context to map attack paths through microservices, enabling security teams to better understand the impact and reach of a vulnerability. The speaker showcases an RCE exploit against a microservices-based application to illustrate how tracing data can be used to identify the root cause and affected components. The presentation emphasizes the importance of integrating security into the development lifecycle and using existing observability infrastructure for security purposes.
Stop Guessing: How Distributed Tracing Exposes Hidden Attack Paths
TLDR: Most security teams treat microservices as black boxes, making it nearly impossible to map the full impact of a vulnerability during triage. By instrumenting applications with OpenTelemetry, you can correlate runtime traces and profiles to visualize exactly how an exploit traverses your architecture. This approach turns abstract alerts into concrete attack paths, allowing you to prioritize critical vulnerabilities based on real-world data rather than theoretical risk.
Modern microservices architectures are a nightmare for incident response. When you find a vulnerability in a single service, you rarely have the visibility to know what that service talks to, what data it handles, or how an attacker might pivot from there. We often rely on static documentation or outdated network diagrams that bear little resemblance to the actual traffic patterns in production. This gap is exactly where attackers thrive. They don't care about your architecture diagrams; they care about the path of least resistance.
The Visibility Gap in Modern Triage
During a typical penetration test or bug bounty engagement, you might identify a Remote Code Execution (RCE) vulnerability in an edge service. The immediate question is always the same: what can I reach from here? If you are flying blind, you are forced to manually map out downstream dependencies, which is slow, error-prone, and often incomplete.
The solution isn't to build more custom security tooling. It is to repurpose the observability infrastructure that your engineering team already maintains. If your developers are using OpenTelemetry for performance monitoring, they are already generating the exact data you need to map attack paths. Distributed tracing provides a map of every service-to-service call, while profiling shows you exactly which functions are executing at runtime.
Mapping the Exploit Path
Consider a scenario where an attacker triggers a template injection vulnerability. In a standard environment, you might see an alert for an unusual process execution. Without context, you are left guessing. Was this a legitimate administrative task or a malicious payload?
By looking at the trace data associated with that request, you can see the entire call chain. You can identify that the request originated at the gateway, passed through an authentication service, hit the vulnerable ad service, and then triggered a database query.
# Example of a vulnerable template injection flow
# The attacker injects a payload that the template engine evaluates
payload = "${T(java.lang.Runtime).getRuntime().exec('id')}"
# Tracing shows this request hitting the ad-service endpoint
# and the subsequent execution of the process builder
When you combine this with profiling data, you get the "why." You can see the stack trace of the execution, confirming that the template engine was indeed the entry point. This isn't just a theory; it is a visual, data-backed confirmation of the exploit path. You can see exactly which downstream services were touched and what data was accessed.
From Triage to Remediation
For a pentester, this level of visibility changes the game. Instead of spending hours trying to figure out if a service is reachable, you can query your tracing backend to see if the service has ever received traffic from the component you just compromised. If the trace shows a direct path to a service handling sensitive data, you have your P0. If the service is isolated, you can adjust your risk assessment accordingly.
This data is equally powerful for blue teams. When an incident occurs, they don't need to ask developers to explain the architecture. They can pull the trace ID from the logs and see the entire lifecycle of the malicious request. They can identify the exact function that was abused, the database queries that were executed, and the downstream services that were impacted.
Demanding Better Tooling
The biggest hurdle to this approach is that security tools often fail to speak the language of modern observability. We are stuck using scanners that don't understand the context of the requests they are sending. As an industry, we need to demand that our security vendors integrate with standard observability formats. We shouldn't have to choose between performance monitoring and security visibility.
If you are a researcher or a pentester, start looking at the observability headers in the applications you test. If you see traceparent or similar headers, you are looking at a goldmine of information. Use it. Don't just report the vulnerability; report the path. Show the team exactly how the request moved through their infrastructure. When you can provide a trace that shows an attacker moving from an edge service to a backend database, you aren't just filing a bug report. You are providing a blueprint for remediation that is impossible to ignore.
Stop relying on static analysis and manual mapping. The data is already there, flowing through your production environment. Start using it to build a more accurate, data-driven understanding of your attack surface. The next time you find a critical bug, don't just stop at the entry point. Trace it to the end.
Vulnerability Classes
Tools Used
Target Technologies
OWASP Categories
Up Next From This Conference
Similar Talks

Kill List: Hacking an Assassination Site on the Dark Web

Firewalls Under Fire: China's Ongoing Campaign to Compromise Network Protection Devices




