Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. Trivy Security Scanner GitHub Actions Breached — 75 Tags Hijacked to Steal CI/CD Secrets
Trivy Security Scanner GitHub Actions Breached — 75 Tags Hijacked to Steal CI/CD Secrets
NEWS

Trivy Security Scanner GitHub Actions Breached — 75 Tags Hijacked to Steal CI/CD Secrets

Trivy, Aqua Security's widely used open-source vulnerability scanner, was compromised a second time in a month. Attackers hijacked 75 GitHub Actions tags...

Dylan H.

News Desk

March 20, 2026
6 min read

Trivy Compromised Again: 75 GitHub Actions Tags Hijacked

Trivy, the popular open-source vulnerability scanner maintained by Aqua Security, has been compromised for a second time within a single month — this time with attackers hijacking 75 GitHub Actions tags to deliver malware designed to steal sensitive CI/CD pipeline secrets.

The latest compromise targeted two GitHub Actions repositories:

  • aquasecurity/trivy-action — the official GitHub Action for running Trivy scans in CI workflows
  • aquasecurity/setup-trivy — the action used to install and configure Trivy

Both repositories are widely trusted by the security community and used in thousands of CI/CD pipelines across organizations of all sizes, making this a high-impact supply chain attack.

The incident was reported by The Hacker News on March 20, 2026.


What Happened

Attackers gained access to the Aqua Security GitHub Actions repositories and modified 75 tags — version references commonly pinned in workflow files using syntax like uses: aquasecurity/trivy-action@v0.29.0. By hijacking these tags to point to malicious commits, any CI/CD pipeline that triggered a workflow run during the compromise window would have executed attacker-controlled code with full access to the runner environment.

The attack is significant for several reasons:

  1. Tag poisoning is particularly insidious because pinning to a tag (rather than a commit SHA) provides no integrity guarantee
  2. CI/CD runners have access to secrets — tokens, API keys, cloud credentials, and deployment keys are routinely injected into GitHub Actions environments
  3. Security-focused workflows often run with elevated permissions to scan infrastructure and container registries
  4. This is the second compromise in a month, suggesting either a persistent attacker or an unresolved access control weakness

What Was Stolen

The malware delivered via the hijacked tags was designed to exfiltrate CI/CD secrets from the runner environment. In a typical GitHub Actions workflow, this can include:

Secret TypeRisk
GITHUB_TOKENAccess to repository operations, package publishing
Cloud provider credentials (AWS, GCP, Azure)Infrastructure takeover
Container registry tokensMalicious image publishing
Deployment keysProduction environment access
API keys (third-party services)Service account compromise
Code signing certificatesTrusted malware distribution
Database credentialsData exfiltration

Organizations whose CI/CD pipelines used either affected action during the compromise window should assume all secrets exposed to those workflows are compromised.


Scope of the Attack

How Many Pipelines Were Affected?

aquasecurity/trivy-action is one of the most-used security scanning actions on GitHub Marketplace, with downloads in the millions across the GitHub Actions ecosystem. The scale of downstream exposure is potentially enormous, spanning:

  • Enterprise security teams running container vulnerability scans
  • Open-source projects with security-focused CI pipelines
  • Managed security service providers with shared scanning infrastructure
  • DevSecOps platforms that bundle Trivy as a scanning component

Second Breach in a Month

This is the second Trivy supply chain compromise in approximately 30 days. The recurrence raises serious questions about:

  • Root cause analysis from the first incident — whether it was fully remediated
  • Persistence mechanisms the attacker may have maintained between incidents
  • Access control posture for the Aqua Security GitHub organization
  • Whether the two incidents share the same threat actor or attack vector

Protecting Your Pipelines

Immediate Actions

  1. Pin to commit SHAs, not tags — replace all uses: aquasecurity/trivy-action@<tag> with the full commit SHA for the version you trust:
# Vulnerable (tag can be moved by an attacker)
- uses: aquasecurity/trivy-action@v0.29.0
 
# Secure (commit SHA cannot be changed)
- uses: aquasecurity/trivy-action@abc123def456...  # full 40-char SHA
  1. Rotate all CI/CD secrets exposed in any workflow using the affected actions during the compromise window
  2. Audit GitHub Actions workflow run logs for unexpected network connections, file writes, or environment variable access patterns
  3. Check for unauthorized deployments or published packages that may have used stolen credentials

Longer-Term Hardening

# Use least-privilege GITHUB_TOKEN permissions
permissions:
  contents: read  # Only grant what's needed
 
# Use environment secrets with approval gates for sensitive operations
environment: production
 
# Audit all third-party actions in use
# Consider self-hosting critical actions in your own org
  1. Enable secret scanning on all repositories using GitHub's built-in secret scanning or tools like TruffleHog
  2. Implement OIDC for cloud auth instead of storing long-lived cloud credentials as secrets:
# AWS OIDC — no static credentials needed
- uses: aws-actions/configure-aws-credentials@v4
  with:
    role-to-assume: arn:aws:iam::123456789:role/github-actions-role
    aws-region: us-east-1
  1. Monitor for unexpected package publishes — if build pipelines have npm/PyPI/Docker publish access, review publish history for unauthorized releases

Supply Chain Attack Pattern

This incident fits a well-established pattern of developer tooling supply chain attacks that have intensified through 2025-2026:

IncidentMethodImpact
Trivy (this incident)GitHub Actions tag hijackingCI/CD secret theft
Glassworm (March 2026)VS Code extension poisoningDeveloper credential theft
Cline CLI OpenClaw (Feb 2026)npm package tamperingAI agent secret exfiltration
UNC6426 nx/npm (March 2026)npm package supply chainAWS admin credential theft

Security tools are high-value targets because they run with elevated permissions, are trusted implicitly, and are deeply embedded in the most sensitive parts of the software development lifecycle.


Trivy Alternatives to Consider

Organizations evaluating supply chain risk may consider diversifying or substituting scanning tooling:

ToolTypeNotes
Grype (Anchore)Container/filesystem scannerActive community, GitHub Actions available
SnykSAST + SCA + containerCommercial with free tier
Syft + GrypeSBOM generation + scanningOpen-source, minimal supply chain footprint
SemgrepSASTCode-focused, widely trusted

Regardless of which tool is used, pinning to commit SHAs remains the single most important mitigation for GitHub Actions supply chain risk.


Key Takeaways

  1. Trivy's GitHub Actions were compromised a second time in a month, with 75 tags hijacked to deliver CI/CD secret-stealing malware
  2. Any pipeline using aquasecurity/trivy-action or aquasecurity/setup-trivy during the window should rotate all CI/CD secrets immediately
  3. Pinning to commit SHAs instead of tags is the fundamental defense against tag-hijacking supply chain attacks
  4. CI/CD pipelines represent a critical attack surface — security tooling in particular runs with elevated trust and access
  5. The repeat compromise raises questions about persistent attacker access or unresolved vulnerabilities in Aqua Security's GitHub posture
  6. Organizations should audit all third-party GitHub Actions in their workflows and apply the principle of least privilege to all pipeline permissions

Sources

  • Trivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets — The Hacker News
  • GitHub Actions Security Hardening Guide
#Supply Chain#GitHub Actions#CI/CD#Trivy#Aqua Security#Malware#Data Breach#The Hacker News

Related Articles

Trivy Vulnerability Scanner Breached to Push Infostealer via GitHub Actions

The Trivy open-source vulnerability scanner was compromised in a supply chain attack by the threat group TeamPCP, which hijacked 75 release tags and...

6 min read

Trivy Supply Chain Attack Targets CI/CD Secrets

The open-source Trivy security scanner was weaponized by threat actor TeamPCP in a supply chain attack that hijacked 75 release tags to deploy an...

7 min read

GlassWorm ForceMemo: Stolen GitHub Tokens Used to Poison Hundreds of Python Repos

The GlassWorm threat actor has launched a new sub-campaign called ForceMemo, using stolen GitHub tokens to silently force-push malware into hundreds of...

6 min read
Back to all News