Tools

News

Notícias

Classificados

Cursos

Broker

IPv4:

IPv6:

 

UpOrDown
Ping
MTR
Smokeping
MTU Detect
Portscan
DNS
HTTP/SSL
My IP
IP Calc
IP Extractor
Uptime Monitor

Trivy Scanner Breach Hits CI/CD Pipelines

Image © Arstechnica
A supply-chain attack against Aqua Security's Trivy vulnerability scanner has forced many developers to rotate secrets and reassess CI/CD workflows.

Hackers have compromised virtually all versions of Aqua Security’s widely used Trivy vulnerability scanner in an ongoing supply-chain attack that could have wide-ranging consequences for developers and the organizations that use them.

Trivy maintainer Itay Shakury confirmed the breach on Friday, following rumors and a thread (now deleted by attackers) discussing the incident. The intrusion began in the early hours of Thursday, and the attackers used stolen credentials to force-push a large number of version tags so that trivy-action and setup-trivy would point to malicious dependencies.

Trivy is a popular vulnerability scanner that developers rely on to detect vulnerabilities and, in some cases, inadvertently expose authentication secrets in pipelines for building and deploying software updates.

Security firms Socket and Wiz describe the malware as scanning development pipelines and even developer machines for GitHub tokens, cloud credentials, SSH keys, Kubernetes tokens, and other secrets; once found, the data is encrypted and sent to attacker-controlled servers. As a result, any CI/CD pipeline referencing compromised version tags could execute attacker code when the Trivy scan runs. Spoofed tags include @0.34.2, @0.33, and @0.18.0; the @0.35.0 tag appears unaffected.

The incident follows an earlier compromise of the Aqua Trivy VS Code extension. Maintainers rotated tokens and secrets, but the process wasn’t fully atomic, leaving residual credentials that enabled the later force-push activity without directly breaching GitHub itself.

Experts urge Trivy users to treat all pipeline secrets as compromised and rotate them immediately, and to follow the defense guidance issued by Socket and Wiz to limit potential fallout.

 

Arstechnica

Related News

GoNetspeed to Bring Fiber Internet to Oneonta
Deadline Looms for 2026 Broadband Awards
EU Urged to Reinstate VMware CSP Program
New Mexico Urges BEAD Funds Release
Brightspeed Hits 75% SC Fiber Build
FedRAMP scrutiny: Microsoft GCC High questioned

ISP.Tools survives thanks to ads.

Consider disabling your ad blocker.
We promise not to be intrusive.

Cookie Consent

We use cookies to improve your experience on our site.

By using our site you consent to cookies. Learn more