Trivy Supply Chain Compromise
What actually happened: Aqua Security's Trivy — one of the most widely used open-source vulnerability scanners (33,200+ GitHub stars) — was compromised twice in March 2026. The critical incident occurred on March 19, 2026, when threat actors used stolen credentials to push a malicious v0.69.4 release and hijack 75 GitHub Actions tags, injecting credential-stealing malware targeting CI/CD pipeline secrets across developer organizations. What's confirmed: The attack timeline, mechanism (force-pushed tags, spoofed commits impersonating known developers), and maintainer acknowledgment are all verified across multiple independent sources. What matters most: Any organization running `aquasecurity/trivy-action` or `aquasecurity/setup-trivy` in their CI/CD pipelines during March 19, 2026 should treat their pipeline secrets as compromised — the full downstream blast radius remains unknown.
The March 19 attack was sophisticated: threat actors obtained valid credentials, used them to force-push malicious commits to GitHub Actions tags, spoofed author identities to evade detection, and deleted the prior compromise discussion to suppress institutional memory. The malware was designed to steal CI/CD secrets — meaning any secrets (API keys, cloud credentials, tokens) stored in affected pipelines are potentially compromised.
1. Downstream victims: No confirmed list of affected organizations or evidence of secondary breaches from stolen secrets 2. Attribution: "TeamPCP" identified as the threat actor for March 19, but no further attribution confirmed 3. Credential source: How the attacker obtained the initial credentials to push to the repository is unconfirmed 4. Official post-mortem: Aqua Security has not published a comprehensive incident report (as of investigation date) 5. Scope of secret theft: Which CI/CD secrets were exfiltrated and how many pipelines were affected
The attack facts are solid. The unknown damage radius is the primary uncertainty.
- Ars Technica23%
- The Hacker News100%
- Wiz50%
- Hacker Newsverified in investigation