Imagining an attack operation where they steal dev credentials, push malicious code, then discover the build fails.
The attacker spends days troubleshooting the build pipeline and finally finds a fix. It now works beautifully; this immediately tips off the company’s engineers.