Organizations using Trivy in automated workflows and Aqua Security: Aqua Security’s Trivy Scanner Hit by Supply Chain Attack

Organizations using Trivy in automated workflows and Aqua Security: Aqua Security’s Trivy Scanner Hit by Supply Chain Attack

Sophisticated Supply Chain Attack Targets Trivy Vulnerability Scanner, Exposing CI/CD Risks

Aqua Security uncovered a sophisticated supply chain attack targeting its open-source Trivy vulnerability scanner, demonstrating how threat actors can exploit trusted development workflows to steal sensitive data without detection. The incident, which did not impact Aqua’s commercial products, highlights critical vulnerabilities in CI/CD pipelines.

Attack Overview

Rather than distributing a malicious binary, attackers hijacked existing GitHub repositories aquasecurity/trivy-action and setup-trivy using stolen credentials. By force-pushing malicious commits to version tags (e.g., v0.x), they ensured automated pipelines pulled compromised code. Since many organizations rely on mutable tags instead of immutable commit hashes, the altered code executed undetected.

The injected payload ran before Trivy’s legitimate scanning process, allowing workflows to complete normally while exfiltrating high-value secrets, including:

  • Cloud credentials (AWS, GCP, Azure)
  • API tokens and access keys
  • SSH private keys
  • Kubernetes service account tokens
  • Docker configuration files

Given CI/CD pipelines’ broad infrastructure access, this could enable lateral movement, privilege escalation, and full environment compromise.

Timeline & Persistence

  • Late February 2026: Initial compromise occurred.
  • March 1: Incomplete credential rotation allowed attackers to retain access.
  • March 22: Additional suspicious activity suggested attempts to reestablish persistence, indicating a multi-stage operation.

Aqua revoked compromised credentials, removed malicious artifacts, and transitioned away from long-lived tokens. Incident response firm Sygnia assisted in forensic investigation and containment. The company confirmed its commercial platform remained unaffected due to strict architectural separation, including isolated infrastructure and gated security reviews.

Mitigation & Indicators of Compromise

Organizations using Trivy in automated workflows should:

  • Upgrade to Trivy v0.69.2 or v0.69.3
  • Use safe GitHub Action versions: trivy-action v0.35.0 or setup-trivy v0.2.6
  • Rotate all secrets if v0.69.4 was executed in any pipeline

Security teams should monitor and block the following indicators:

  • Domain: scan.aquasecurtiy[.]org
  • IP Address: 45.148.10.212
  • Secondary C2: plug-tab-protective-relay.trycloudflare.com
  • GitHub repo: Unauthorized tpcp-docs
  • ICP-based C2: tdtqy-oyaaa-aaaae-af2dq-cai.raw.icp0.io

Key Takeaway

The attack exploited over-reliance on mutable version tags in CI/CD pipelines. A simple defensive measure pinning dependencies to immutable commit SHA hashes could have prevented the compromise. As CI/CD pipelines become prime targets, organizations must enforce strict access controls, monitoring, and dependency integrity validation to mitigate supply chain risks.

Source: https://cyberpress.org/aqua-securitys-trivy-scanner-hit-by-supply-chain-attack/

Semgrep cybersecurity rating report: https://www.rankiteo.com/company/semgrep

Aqua-Aerobic Systems, Inc. cybersecurity rating report: https://www.rankiteo.com/company/aqua-aerobic-systems-inc-

"id": "SEMAQU1774434920",
"linkid": "semgrep, aqua-aerobic-systems-inc-",
"type": "Cyber Attack",
"date": "3/2026",
"severity": "85",
"impact": "4",
"explanation": "Attack with significant impact with customers data leaks"
{'affected_entities': [{'customers_affected': 'Organizations using Trivy in '
                                              'automated workflows',
                        'industry': 'Cybersecurity',
                        'name': 'Aqua Security (Trivy open-source project)',
                        'type': 'Open-source software provider'}],
 'attack_vector': 'Hijacked GitHub repositories, malicious commits to version '
                  'tags',
 'customer_advisories': 'Organizations using Trivy in automated workflows '
                        'should upgrade and rotate secrets',
 'data_breach': {'data_exfiltration': True,
                 'personally_identifiable_information': 'Credentials and '
                                                        'access tokens',
                 'sensitivity_of_data': 'High',
                 'type_of_data_compromised': ['Cloud credentials',
                                              'API tokens',
                                              'Access keys',
                                              'SSH private keys',
                                              'Kubernetes service account '
                                              'tokens',
                                              'Docker configuration files']},
 'date_detected': '2026-03-22',
 'description': 'Aqua Security uncovered a sophisticated supply chain attack '
                'targeting its open-source Trivy vulnerability scanner, '
                'demonstrating how threat actors can exploit trusted '
                'development workflows to steal sensitive data without '
                'detection. The incident highlights critical vulnerabilities '
                'in CI/CD pipelines.',
 'impact': {'data_compromised': 'Cloud credentials (AWS, GCP, Azure), API '
                                'tokens, access keys, SSH private keys, '
                                'Kubernetes service account tokens, Docker '
                                'configuration files',
            'identity_theft_risk': 'High (PII and credentials exposed)',
            'operational_impact': 'Potential full environment compromise, '
                                  'lateral movement',
            'systems_affected': 'CI/CD pipelines using compromised Trivy '
                                'versions'},
 'initial_access_broker': {'backdoors_established': 'Malicious commits to '
                                                    'version tags',
                           'entry_point': 'Hijacked GitHub repositories '
                                          '(aquasecurity/trivy-action, '
                                          'setup-trivy)',
                           'high_value_targets': 'CI/CD pipelines with broad '
                                                 'infrastructure access'},
 'investigation_status': 'Contained, forensic investigation completed',
 'lessons_learned': 'The attack exploited over-reliance on mutable version '
                    'tags in CI/CD pipelines. Pinning dependencies to '
                    'immutable commit SHA hashes could have prevented the '
                    'compromise.',
 'motivation': 'Data exfiltration, lateral movement, privilege escalation',
 'post_incident_analysis': {'corrective_actions': 'Revoked compromised '
                                                  'credentials, transitioned '
                                                  'to immutable commit hashes, '
                                                  'enhanced monitoring',
                            'root_causes': 'Stolen credentials, mutable '
                                           'version tags in CI/CD pipelines, '
                                           'incomplete credential rotation'},
 'recommendations': ['Upgrade to Trivy v0.69.2 or v0.69.3',
                     'Use safe GitHub Action versions: trivy-action v0.35.0 or '
                     'setup-trivy v0.2.6',
                     'Rotate all secrets if v0.69.4 was executed in any '
                     'pipeline',
                     'Enforce strict access controls, monitoring, and '
                     'dependency integrity validation in CI/CD pipelines'],
 'references': [{'source': 'Aqua Security'}],
 'response': {'containment_measures': 'Revoked compromised credentials, '
                                      'removed malicious artifacts, '
                                      'transitioned away from long-lived '
                                      'tokens',
              'incident_response_plan_activated': True,
              'remediation_measures': 'Upgraded to Trivy v0.69.2 or v0.69.3, '
                                      'pinned dependencies to immutable commit '
                                      'SHA hashes',
              'third_party_assistance': 'Sygnia (forensic investigation and '
                                        'containment)'},
 'title': 'Sophisticated Supply Chain Attack Targets Trivy Vulnerability '
          'Scanner, Exposing CI/CD Risks',
 'type': 'Supply Chain Attack',
 'vulnerability_exploited': 'Over-reliance on mutable version tags in CI/CD '
                            'pipelines, stolen credentials'}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.