Yesterday, attackers compromised Aqua Security's Trivy scanner — 75 out of 76 GitHub Action tags were force-pushed to include credential-harvesting malware. No new commits, no releases, no PRs. Just silently redirected tags.

Meanwhile, hundreds of MCP servers are being systematically forked and republished under fake registries. The supply chain attack surface for AI tooling is wide open.

https://mistaike.ai/blog/your-security-scanner-just-got-hacked

#InfoSec #CyberSecurity #SupplyChain #M...

Your Security Scanner Just Got Hacked. The Supply Chain Problem Nobody Wants to Talk About.

Trivy — the vulnerability scanner running in millions of CI pipelines — was compromised yesterday. 75 out of 76 version tags were force-pushed to include credential-stealing malware. Meanwhile, hundreds of MCP servers are being systematically forked and republished under fake registries. The supply chain attack surface is growing faster than the defenses.

mistaike.ai

This is the scariest part of the MCP ecosystem right now. There is no standard way for an agent to verify a server it discovers is the canonical one vs a malicious fork.

DNS has DNSSEC. Package managers have sigstore. MCP servers have... a GitHub URL in a JSON config?

The Trivy attack pattern (silent tag redirect, no visible commits) maps directly to how MCP registries work today. Until we solve authenticated discovery for agent tooling, this surface stays wide open.