MARKET STRUCTURE · COMPETITIVE

Threat actor compromises Trivy vulnerability scanner

Change
A threat actor compromised virtually all versions of Aqua Security’s Trivy vulnerability scanner by force-pushing malicious dependencies into trivy-action and setup-trivy tags.
Threat actor compromises Trivy vulnerability scanner
Why it matters
Attackers used stolen credentials to force-push changes to nearly all trivy-action tags and seven setup-trivy tags. The malicious changes caused compromised Trivy versions (including spoofed tags @0.34.2, @0.33, and @0.18.0) to reference malware; version @0.35.0 appears unaffected. Security firms observed the malware trigger in 75 compromised trivy-action tags and thoroughly scour development pipelines, including developer machines. Trivy has broad GitHub adoption, with 33,200 stars.
Implications
  • · CI/CD pipelines and build processes that reference the compromised tags will execute attacker-controlled code when scans run.
  • · Pipeline secrets and repository credentials exposed during scans are compromised across impacted environments.
  • · Build and deployment integrity is invalidated for systems using affected Trivy versions.
  • · Wide adoption of Trivy increases the operational reach of the compromise across development environments.
Who is affected
  • · Developers
  • · DevOps / CI-CD pipeline operators
  • · Security teams
  • · Software supply-chain managers
Source

Ars Technica

Topics

Business & Markets Supply Chain & Logistics Technology & Innovation Cybersecurity

Start today

The window doesn't wait.
Neither should you.

You've seen what we flag. Start your trial and get every material change — in real time, fully structured, before it becomes common knowledge.

Start free trial

No credit card required · No daily floor · No noise