HomeTechnologyWidely used Trivy scanner compromised in ongoing supply-chain attack

Widely used Trivy scanner compromised in ongoing supply-chain attack

TechnologyMarch 21, 2026
1 min read
Widely used Trivy scanner compromised in ongoing supply-chain attack
Admins: Sorry to say, but it's likely a rotate-your-secrets kind of weekend.

Hackers have compromised virtually all versions of Aqua Security’s widely used Trivy vulnerability scanner in an ongoing supply chain attack that could have wide-ranging consequences for developers and the organizations that use them.

Trivy maintainer Itay Shakury confirmed the compromise on Friday, following rumors and a thread, since deleted by the attackers, discussing the incident. The attack began in the early hours of Thursday. When it was done, the threat actor had used stolen credentials to force-push all but one of the trivy-action tags and seven setup-trivy tags to use malicious dependencies.

Assume your pipelines are compromised

A forced push is a git command that overrides a default safety mechanism that protects against overwriting existing commits. Trivy is a vulnerability scanner that developers use to detect vulnerabilities and inadvertently hardcoded authentication secrets in pipelines for developing and deploying software updates. The scanner has 33,200 stars on GitHub, a high rating that indicates it’s used widely.

Read full article

Comments

Source: Ars Technica

Share this article

Related Articles

Amazon is ending support for older Kindles and Kindle Fires
2026Apr 08

Amazon is ending support for older Kindles and Kindle Fires

Amazon has announced that starting on May 20th, 2026, Kindle e-readers and Kindle Fire devices released in 2012 and earlier will "no longer be able to purchase, borrow, or download new content via the

Article1 min read
Read More