CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

Tag poisoning in Trivy GitHub Actions repositories delivers cloud-native infostealer payload

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

Attackers compromised two official Trivy-related GitHub Actions repositories—aquasecurity/trivy-action and aquasecurity/setup-trivy—by force-pushing 75 version tags to malicious commits hosting a Python-based infostealer. The payload targets CI/CD runners to harvest developer secrets including SSH keys, cloud provider credentials, Kubernetes tokens, and cryptocurrency wallet keys. The incident follows a prior Trivy supply-chain compromise in February–March 2026 and highlights sustained abuse of compromised credentials to poison tag references without requiring Git-level exploitation.

Timeline

  1. 20.03.2026 19:47 1 articles · 2h ago

    Tag poisoning in Trivy GitHub Actions repositories delivers cloud-native infostealer payload

    Attackers force-pushed 75 version tags in aquasecurity/trivy-action and seven tags in aquasecurity/setup-trivy to malicious commits hosting a Python-based infostealer. The payload executes in GitHub Actions runners to harvest and exfiltrate CI/CD secrets, including cloud provider credentials, Kubernetes tokens, and cryptocurrency wallet keys. The compromise stemmed from reused, compromised credentials that allowed tag rewriting without Git-level exploitation. Safe releases are now available, and mitigation includes pinning Actions to full SHA hashes, blocking the exfiltration endpoint, and rotating all affected secrets.

    Show sources

Information Snippets