Trivy ecosystem supply chain briefly compromised

(github.com)

25 points | by batch12 1 day ago

5 comments

  • Shank 13 minutes ago
    This attack seems predicated on a prior security incident (https://socket.dev/blog/unauthorized-ai-agent-execution-code...) at Trivy where they failed to successfully remediate and contain the damage. I think at this time, Trivy should’ve undertaken a full reassessment of risks and clearly isolated credentials and reduced risk systemically. This did not happen, and the second compromise occurred.
  • snailmailman 1 hour ago
    Are the spam comments all from compromised accounts, presumably compromised due to this hack?

    I only clicked on a handful of accounts but several of them have plausibly real looking profiles.

  • RS-232 37 minutes ago
    Pretty ironic that the security tool is insecure
  • MilnerRoute 1 hour ago
    Briefly?

    "Trivy Supply Chain Attack Spreads, Triggers Self-Spreading CanisterWorm Across 47 npm Packages"

    https://it.slashdot.org/story/26/03/22/0039257/trivy-supply-...

    • brightball 0 minutes ago
      Seriously. All credentials compromised that it can see. It's active in CI/CD pipelines and follow on attacks are happening.
    • zach_vantio 15 minutes ago
      "Briefly" is doing a lot of work there. Pre-deploy scans are useless once a bad mutation is actually live. If you don't have a way to auto-revert the infrastructure state instantly, you're just watching the fire spread.
  • robutsume 1 hour ago
    [dead]