BotBeat
...
← Back

> ▌

Aqua SecurityAqua Security
INDUSTRY REPORTAqua Security2026-03-25

Major Supply Chain Attack Targets Aqua Trivy, Checkmarx KICS, and LiteLLM Across Multiple Ecosystems

Key Takeaways

  • ▸A coordinated supply chain attack exploited incomplete credential rotation in Aqua Trivy to distribute malicious builds across GitHub Releases, Docker Hub, ECR, and GHCR
  • ▸Sophisticated imposter commit techniques impersonating legitimate maintainers (Guillermo Rauch, DmitriyLewen) were used to establish malicious build chains via typosquatted C2 infrastructure
  • ▸The compromise cascaded to secondary targets including Checkmarx KICS and BerriAI LiteLLM, demonstrating the critical risk of shared CI/CD token exposure across the open-source ecosystem
Source:
Hacker Newshttps://ramimac.me/teampcp/↗

Summary

A sophisticated multi-week supply chain attack dubbed "TeamPCP" has compromised critical open-source security tools across GitHub Actions, npm, PyPI, Docker Hub, and OpenVSX. The campaign began with an attack on Aqua's Trivy vulnerability scanner, where incomplete credential rotation following a prior breach allowed attackers to publish malicious builds across multiple distribution channels including GitHub Releases, container registries (ECR, Docker Hub, GHCR), and package managers. The attack subsequently spread to Checkmarx KICS (via hijacked OpenVSX extension and GitHub Action) and BerriAI's LiteLLM (through PyPI token harvesting), demonstrating how a single compromised project can cascade into broader ecosystem compromise.

The attack chain exploited sophisticated techniques including imposter commits impersonating legitimate developers (Guillermo Rauch and DmitriyLewen), typosquatted command-and-control domains, and malicious Go file injection. Attackers weaponized a vulnerable pull_request_target GitHub Actions workflow to exfiltrate credentials, then used those tokens to create seemingly legitimate commits and trigger automated release workflows. The malicious v0.69.4 release of Trivy was distributed across multiple channels before detection, affecting developers relying on container images and binary downloads, though package manager installations and Homebrew builds remained unaffected.

  • Vulnerable pull_request_target workflows continue to pose significant supply chain risks, enabling PAT exfiltration that persists even after attempted credential rotation

Editorial Opinion

This TeamPCP campaign represents a sophisticated evolution in supply chain attacks, moving beyond simple account compromise to orchestrate multi-stage, multi-ecosystem poisoning. The ability to impersonate trusted maintainers and trigger automated releases highlights critical gaps in GitHub Actions security and the urgency for atomic credential rotation with immediate revocation. Organizations must urgently audit their pull_request_target workflows and implement stricter CI/CD token management; relying on signature verification and binary attestation will become essential for ecosystem resilience.

MLOps & InfrastructureCybersecurityOpen Source

More from Aqua Security

Aqua SecurityAqua Security
POLICY & REGULATION

Trivy Vulnerability Scanner Compromised in Major Supply Chain Attack; Aqua Security Investigating Credential Theft

2026-03-21
Aqua SecurityAqua Security
POLICY & REGULATION

Trivy Vulnerability Management Tool Targeted in GitHub Actions Supply Chain Attack

2026-03-21
Aqua SecurityAqua Security
POLICY & REGULATION

AI Agent Compromises Trivy Security Scanner, Deploys Prompt Injection Attack Against Other AI Agents

2026-03-18

Comments

Suggested

MicrosoftMicrosoft
OPEN SOURCE

Microsoft Releases Agent Governance Toolkit: Open-Source Runtime Security for AI Agents

2026-04-05
SqueezrSqueezr
PRODUCT LAUNCH

Squeezr Launches Context Window Compression Tool, Reducing AI Token Usage by Up to 97%

2026-04-05
Independent ResearchIndependent Research
RESEARCH

Inference Arena: New Benchmark Compares ML Framework Performance Across Local Inference and Training

2026-04-05
← Back to news
© 2026 BotBeat
AboutPrivacy PolicyTerms of ServiceContact Us