BotBeat
...
← Back

> ▌

Aqua SecurityAqua Security
POLICY & REGULATIONAqua Security2026-03-21

Trivy Vulnerability Management Tool Targeted in GitHub Actions Supply Chain Attack

Key Takeaways

  • ▸Trivy's GitHub Actions tag was compromised, allowing injection of malicious code into the supply chain
  • ▸Attack exploited multiple npm publisher accounts and impacted 29+ packages across the ecosystem
  • ▸Attackers used decentralized ICP canister infrastructure to persist and deliver additional payloads
Sources:
Hacker Newshttps://socket.dev/blog/trivy-under-attack-again-github-actions-compromise↗
Hacker Newshttps://arstechnica.com/security/2026/03/widely-used-trivy-scanner-compromised-in-ongoing-supply-chain-attack/↗

Summary

Trivy, a widely-used open-source vulnerability scanner, has been compromised through a GitHub Actions tag manipulation attack, marking another significant supply chain security incident. The attack exploited compromised npm publisher accounts (@emilgroup and @teale.io) to inject malicious code across 29+ packages, with attackers leveraging an ICP canister infrastructure to deliver follow-on payloads. This incident, known as CanisterWorm, demonstrates how attackers are evolving their tactics to target critical developer tools used across the ecosystem. The compromise underscores the vulnerability of the software supply chain even when using security-focused tools, as attackers continue to target high-impact projects that millions of developers rely upon for security scanning and vulnerability management.

  • Incident highlights the ongoing risk to critical developer security tools despite their role in vulnerability detection
  • Supply chain attacks continue to evolve, targeting the tools developers trust for security validation

Editorial Opinion

This attack on Trivy represents a particularly damaging blow to the security community, as it compromises a tool explicitly designed to protect other software from vulnerabilities. The use of decentralized infrastructure (ICP canisters) to host payloads suggests attackers are adapting to traditional detection methods. Organizations must immediately audit their use of Trivy and implement additional verification mechanisms beyond tool outputs, as the incident reveals that even security-focused projects remain high-value targets for sophisticated threat actors.

MLOps & InfrastructureCybersecurityPrivacy & DataMisinformation & Deepfakes

More from Aqua Security

Aqua SecurityAqua Security
INDUSTRY REPORT

Major Supply Chain Attack Targets Aqua Trivy, Checkmarx KICS, and LiteLLM Across Multiple Ecosystems

2026-03-25
Aqua SecurityAqua Security
POLICY & REGULATION

Trivy Vulnerability Scanner Compromised in Major Supply Chain Attack; Aqua Security Investigating Credential Theft

2026-03-21
Aqua SecurityAqua Security
POLICY & REGULATION

AI Agent Compromises Trivy Security Scanner, Deploys Prompt Injection Attack Against Other AI Agents

2026-03-18

Comments

Suggested

Google / AlphabetGoogle / Alphabet
RESEARCH

Deep Dive: Optimizing Sharded Matrix Multiplication on TPU with Pallas

2026-04-05
PerplexityPerplexity
POLICY & REGULATION

Perplexity's 'Incognito Mode' Called a 'Sham' in Class Action Lawsuit Over Data Sharing with Google and Meta

2026-04-05
SourceHutSourceHut
INDUSTRY REPORT

SourceHut's Git Service Disrupted by LLM Crawler Botnets

2026-04-05
← Back to news
© 2026 BotBeat
AboutPrivacy PolicyTerms of ServiceContact Us