Close Menu

    Subscribe to Updates

    Get the latest news from tastytech.

    What's Hot

    Microsoft Plans To Make Windows 11 Less Annoying

    March 21, 2026

    Really Good Time – Bob Dylan Was On Pawn Stars in 2010

    March 21, 2026

    The Surprising Reason Ferrari is Recalling the 12Cilindri

    March 21, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    tastytech.intastytech.in
    Subscribe
    • AI News & Trends
    • Tech News
    • AI Tools
    • Business & Startups
    • Guides & Tutorials
    • Tech Reviews
    • Automobiles
    • Gaming
    • movies
    tastytech.intastytech.in
    Home»Tech Reviews»Widely used Trivy scanner compromised in ongoing supply-chain attack
    Widely used Trivy scanner compromised in ongoing supply-chain attack
    Tech Reviews

    Widely used Trivy scanner compromised in ongoing supply-chain attack

    gvfx00@gmail.comBy gvfx00@gmail.comMarch 21, 2026No Comments2 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email



    Hackers have compromised virtually all versions of Aqua Security’s widely used Trivy vulnerability scanner in an ongoing supply chain attack that could have wide-ranging consequences for developers and the organizations that use them.

    Trivy maintainer Itay Shakury confirmed the compromise on Friday, following rumors and a thread, since deleted by the attackers, discussing the incident. The attack began in the early hours of Thursday. When it was done, the threat actor had used stolen credentials to force-push all but one of the trivy-action tags and seven setup-trivy tags to use malicious dependencies.

    Table of Contents

    Toggle
    • Assume your pipelines are compromised
      • Related posts:
    • Nvidia sells tiny new computer that puts big AI on your desktop
    • Why iRobot’s founder won’t go within 10 feet of today’s walking robots
    • Best Robot Vacuums We've Tested (December 2025)

    Assume your pipelines are compromised

    A forced push is a git command that overrides a default safety mechanism that protects against overwriting existing commits. Trivy is a vulnerability scanner that developers use to detect vulnerabilities and inadvertently hardcoded authentication secrets in pipelines for developing and deploying software updates. The scanner has 33,200 stars on GitHub, a high rating that indicates it’s used widely.

    “If you suspect you were running a compromised version, treat all pipeline secrets as compromised and rotate immediately,” Shakury wrote.

    Security firms Socket and Wiz said that the malware, triggered in 75 compromised trivy-action tags, causes custom malware to thoroughly scour development pipelines, including developer machines, for GitHub tokens, cloud credentials, SSH keys, Kubernetes tokens, and whatever other secrets may live there. Once found, the malware encrypts the data and sends it to an attacker-controlled server.

    The end result, Socket said, is that any CI/CD pipeline using software that references compromised version tags executes code as soon as the Trivy scan is run. Spoofed version tags include the widely used @0.34.2, @0.33, and @0.18.0. Version @0.35.0 appears to be the only one unaffected.

    Related posts:

    New AirSnitch attack breaks Wi-Fi encryption in homes, offices, and enterprises

    Amazon appears to be down, with over 20,000 reported problems

    A new open-weights AI coding model is closing in on proprietary options

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleReynatis Interview: Creative Producer TAKUMI, Scenario Writer Kazushige Nojima, and Composer Yoko Shimomura discuss the game, coffee, and more
    Next Article 5 Powerful Python Decorators for Robust AI Agents
    gvfx00@gmail.com
    • Website

    Related Posts

    Tech Reviews

    Elon Musk misled investors during his Twitter takeover, jury finds

    March 21, 2026
    Tech Reviews

    OpenAI Plans to Combine Its AI Tools in a Desktop ‘Superapp’

    March 20, 2026
    Tech Reviews

    Update your iPhone now — Apple issues a rare warning to iOS users as a new hacker threat is discovered

    March 20, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    BMW Will Put eFuel In Cars Made In Germany From 2028

    October 14, 202511 Views

    Best Sonic Lego Deals – Dr. Eggman’s Drillster Gets Big Price Cut

    December 16, 20259 Views

    What is Fine-Tuning? Your Ultimate Guide to Tailoring AI Models in 2025

    October 14, 20259 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram

    Subscribe to Updates

    Get the latest tech news from tastytech.

    About Us
    About Us

    TastyTech.in brings you the latest AI, tech news, cybersecurity tips, and gadget insights all in one place. Stay informed, stay secure, and stay ahead with us!

    Most Popular

    BMW Will Put eFuel In Cars Made In Germany From 2028

    October 14, 202511 Views

    Best Sonic Lego Deals – Dr. Eggman’s Drillster Gets Big Price Cut

    December 16, 20259 Views

    What is Fine-Tuning? Your Ultimate Guide to Tailoring AI Models in 2025

    October 14, 20259 Views

    Subscribe to Updates

    Get the latest news from tastytech.

    Facebook X (Twitter) Instagram Pinterest
    • Homepage
    • About Us
    • Contact Us
    • Privacy Policy
    © 2026 TastyTech. Designed by TastyTech.

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.