#trivy supply chain attack spreads to #dockerhub. Compromised Docker Hub images and a self-propagating npm worm have been discovered, escalating the Trivy breach into a multi-platform threat. Stolen npm tokens from infected CI/CD pipelines fueled a self-propagating worm dubbed #CanisterWorm, compromising nearly 50 npm packages across multiple scopes.

https://thehackernews.com/2026/03/trivy-security-scanner-github-actions.html?m=1

Trivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets

Trivy attack force-pushed 75 tags via GitHub Actions, exposing CI/CD secrets, enabling data theft and persistence across developer systems.

The Hacker News
Trivy vulnerability scanner breach pushed infostealer via GitHub Actions

The Trivy vulnerability scanner was compromised in a supply-chain attack by threat actors known as TeamPCP, which distributed credential-stealing malware through official releases and GitHub Actions.

BleepingComputer

#Trivy got compromised on thursday and released a backdoored new version, which was rolled back. We spent the entire friday in incident response mode. Now they got compromised again over the weekend.

I have a lot of sympathy for people under pressure during an incident, but for fucks sake, having a security tool get compromised three times within two months is just completely bonkers. We spent more time remediating security issues caused by our security tooling than any other cause. And the fact that there wasn't any official communication on friday means that we had to rely on third-party writeups, which were missing critical information like exact docker container digests and time ranges of the compromise. This made incident response completely miserable.

Anyway. Trivy 0.69.4, 0.69.5, 0.69.6 were all compromised with infostealer malware. Do what you have to do. There are several decent writeups:
- https://www.stepsecurity.io/blog/trivy-compromised-a-second-time---malicious-v0-69-4-release
- https://www.wiz.io/blog/trivy-compromised-teampcp-supply-chain-attack
- https://labs.boostsecurity.io/articles/20-days-later-trivy-compromise-act-ii/

And Trivy has an advisory on their GitHub that covers last thursday, but not the second compromise over the weekend: https://github.com/aquasecurity/trivy/security/advisories/GHSA-69fq-xp46-6x23

#ThreatIntel #SupplyChain

Trivy Compromised a Second Time - Malicious v0.69.4 Release, aquasecurity/setup-trivy, aquasecurity/trivy-action GitHub Actions Compromised - StepSecurity

On March 19, 2026, trivy — a widely used open source vulnerability scanner maintained by Aqua Security — experienced a second security incident. Three weeks after the hackerbot-claw incident on February 28 that resulted in a repository takeover, a new compromised release (v0.69.4) was published to the trivy repository. The original incident disclosure discussion (#10265) was also deleted during this period, and version tags on the aquasecurity/setup-trivy GitHub Action were removed. Trivy maintainers deleted the v0.69.4 tag and Homebrew downgraded to v0.69.3. The following is a factual account of what we observed through public GitHub data.

Trivy Supply Chain Attack Spreads, Triggers Self-Spreading CanisterWorm Across 47 npm Packages - Slashdot

"We have removed all malicious artifacts from the affected registries and channels," Trivy maintainer Itay Shakury posted today, noting that all the latest Trivy releases "now point to a safe version." But "On March 19, we observed that a threat actor used a compromised credential..." And today T...

Trivy Compromised by "TeamPCP" | Wiz Blog

Breaking down the March 2026 Trivy supply chain attack. TeamPCP compromised trivy + trivy-action & setup-trivy GitHub Actions, deploying credential stealers.

wiz.io
🌘 Trivy 生態系供應鏈遭短暫入侵:安全公告與漏洞分析
➤ 憑證輪替不徹底釀成大禍,資安工具鏈成為駭客目標
https://github.com/aquasecurity/trivy/security/advisories/GHSA-69fq-xp46-6x23
2026 年 3 月 19 日,開源安全工具 Trivy 的供應鏈遭到駭客入侵。攻擊者利用先前未完全清除的受損憑證,惡意發佈了 Trivy v0.69.4 版本,並透過強制推送(force-push)標籤的方式,植入了一款資訊竊取程式(infostealer)。該惡意軟體不僅會抓取執行環境中的敏感憑證(如 SSH 金鑰、雲端服務憑證),甚至會將竊取的資料上傳至公開的 GitHub 儲存庫。Aqua Security 已緊急移除受影響版本並修復漏洞,呼籲使用者儘速更新,並全面輪替可能洩漏的環境變數與金鑰。
+ 這種供應鏈攻擊太恐怖了,竟然透過 GitHub Action 的標籤劫持就能竊取 Runner 的記憶體資訊。看來之後引用 Action
#資安漏洞 #供應鏈攻擊 #Trivy #GitHub Actions
Trivy ecosystem supply chain briefly compromised

## Summary On March 19, 2026, a threat actor used compromised credentials to publish a malicious Trivy v0.69.4 release, force-push 76 of 77 version tags in `aquasecurity/trivy-action` to credent...

GitHub
Trivy ecosystem supply chain briefly compromised

## Summary On March 19, 2026, a threat actor used compromised credentials to publish a malicious Trivy v0.69.4 release, force-push 76 of 77 version tags in `aquasecurity/trivy-action` to credent...

GitHub
Oh, look! Another thrilling tale of a #security #incident, wrapped in a #GitHub interface that looks like it was designed by committee 🤦‍♂️. Clearly, the future of AI-driven #code #security is just more menu options and endless scrolls 🙄. #Trivy, saving the world one dropdown at a time! 🛠️✨
https://github.com/aquasecurity/trivy/discussions/10425 #AI #tech #news #HackerNews #ngated
Trivy Security incident 2026-03-19 · aquasecurity trivy · Discussion #10425

On March 19, a threat actor used a compromised credential to publish malicious trivy (v0.69.4), trivy-action, and setup-trivy releases. This was a follow up from the recent incident (2026-03-01) wh...

GitHub
Trivy Security incident 2026-03-19 · aquasecurity trivy · Discussion #10425

On March 19, a threat actor used a compromised credential to publish malicious trivy (v0.69.4), trivy-action, and setup-trivy releases. This was a follow up from the recent incident (2026-03-01) wh...

GitHub