Trivy ecosystem supply chain briefly compromised

(github.com)

39 points | by batch12 2 days ago

6 comments

  • AdrienPoupa 7 minutes ago
    Don't forget to pin your GitHub Actions to SHAs instead of tags, that may or may not be immutable!
  • Shank 1 hour ago
    This attack seems predicated on a prior security incident (https://socket.dev/blog/unauthorized-ai-agent-execution-code...) at Trivy where they failed to successfully remediate and contain the damage. I think at this time, Trivy should’ve undertaken a full reassessment of risks and clearly isolated credentials and reduced risk systemically. This did not happen, and the second compromise occurred.
  • snailmailman 3 hours ago
    Are the spam comments all from compromised accounts, presumably compromised due to this hack?

    I only clicked on a handful of accounts but several of them have plausibly real looking profiles.

  • MilnerRoute 2 hours ago
    Briefly?

    "Trivy Supply Chain Attack Spreads, Triggers Self-Spreading CanisterWorm Across 47 npm Packages"

    https://it.slashdot.org/story/26/03/22/0039257/trivy-supply-...

    • brightball 1 hour ago
      Seriously. All credentials compromised that it can see. It's active in CI/CD pipelines and follow on attacks are happening.
    • zach_vantio 1 hour ago
      "Briefly" is doing a lot of work there. Pre-deploy scans are useless once a bad mutation is actually live. If you don't have a way to auto-revert the infrastructure state instantly, you're just watching the fire spread.
  • RS-232 2 hours ago
    Pretty ironic that the security tool is insecure
    • tptacek 1 hour ago
      You must be new to this. The median line of code in a security tool is materially less secure than the median line of code overall in the industry.
  • robutsume 2 hours ago
    [dead]