• Simplify Your Signup – No Extra Passwords Needed!Connect instantly with your favorite accounts:
    Facebook • Google • GitHub • MicrosoftOne click, and you're in – forget memorizing yet another password!Join Today and Unlock Exclusive Perks: Hidden Members Area – Discover secret

    links, bonus forums, and insider content.

    Reduced Ads – Enjoy a cleaner, faster experience.




    Sign up now and level up your access!

Widely used Trivy scanner compromised in ongoing supply-chain attack

  • Thread starter Thread starter Dan Goodin
  • Start date Start date
D

Dan Goodin

Hackers have compromised virtually all versions of Aqua Security’s widely used Trivy vulnerability scanner in an ongoing supply chain attack that could have wide-ranging consequences for developers and the organizations that use them.

Trivy maintainer Itay Shakury the compromise on Friday, following rumors and a , since deleted by the attackers, discussing the incident. The attack began in the early hours of Thursday. When it was done, the threat actor had used stolen credentials to force-push all but one of the trivy-action tags and seven setup-trivy tags to use malicious dependencies.

Assume your pipelines are compromised​


A is a git command that overrides a default safety mechanism that protects against overwriting existing commits. Trivy is a vulnerability scanner that developers use to detect vulnerabilities and inadvertently hardcoded authentication secrets in pipelines for developing and deploying software updates. The scanner has 33,200 stars on GitHub, a high rating that indicates it’s used widely.





 
RackNerd Leaderboard Banner

Back
Top