Kim รีทวีตแล้ว

🚨 Breaking: Trivy GitHub Actions supply chain attack – 75 out of 76 version tags compromised.
If your CI/CD pipelines reference “aquasecurity/trivy-action” by version tag, you’re likely running malware right now.
At Socket, we identified that an attacker force-pushed nearly every version tag in the official aquasecurity/trivy-action repository. That’s @0.0.1 all the way through @0.34.2. Over 10,000 GitHub workflow files reference this action.
The malicious payload runs silently before the legitimate Trivy scan, so nothing looks broken. Meanwhile it’s:
- Dumping runner process memory to extract secrets
- Harvesting SSH keys
- Exfiltrating AWS, GCP, and Azure credentials
- Stealing Kubernetes service account tokens
The only unaffected tag right now appears to be @0.35.0.
Socket independently detected this at 19:15 UTC and generated 182 threat feed entries tied to this campaign – all correctly classified as Backdoor, Infostealer, or Reconnaissance malware.
This is the second Trivy compromise this month. Earlier in March, attackers injected code into the Aqua Trivy VS Code extension on OpenVSX to abuse local AI coding agents.
The compromised tags are still active. Pin to @0.35.0 or use a SHA reference until this is fully remediated.
Full write-up: socket.dev/blog/trivy-und…
English



















