Trivy ecosystem supply chain briefly compromised
37 points
2 days ago
| 4 comments
| github.com
| HN
Shank
1 hour ago
[-]
This attack seems predicated on a prior security incident (https://socket.dev/blog/unauthorized-ai-agent-execution-code...) at Trivy where they failed to successfully remediate and contain the damage. I think at this time, Trivy should’ve undertaken a full reassessment of risks and clearly isolated credentials and reduced risk systemically. This did not happen, and the second compromise occurred.
reply
snailmailman
3 hours ago
[-]
Are the spam comments all from compromised accounts, presumably compromised due to this hack?

I only clicked on a handful of accounts but several of them have plausibly real looking profiles.

reply
bakugo
2 hours ago
[-]
Some of them were likely already compromised before these incidents, here's one of the accounts near the top making malicious commits to its own repository before the first hack:

https://github.com/Hancie123/mero_hostel_backend/commit/4bcb...

reply
wswin
1 hour ago
[-]
what comments?
reply
snailmailman
40 minutes ago
[-]
Ah, I think the HN post was merged. My original comment was in response to this related github discussion: https://github.com/aquasecurity/trivy/discussions/10420

There are hundreds of automated spam comments there from presumably compromised accounts. The new OP is much more clear regarding what has happened.

reply
RS-232
1 hour ago
[-]
Pretty ironic that the security tool is insecure
reply
tptacek
53 minutes ago
[-]
You must be new to this. The median line of code in a security tool is materially less secure than the median line of code overall in the industry.
reply
MilnerRoute
2 hours ago
[-]
Briefly?

"Trivy Supply Chain Attack Spreads, Triggers Self-Spreading CanisterWorm Across 47 npm Packages"

https://it.slashdot.org/story/26/03/22/0039257/trivy-supply-...

reply
brightball
1 hour ago
[-]
Seriously. All credentials compromised that it can see. It's active in CI/CD pipelines and follow on attacks are happening.
reply
zach_vantio
1 hour ago
[-]
"Briefly" is doing a lot of work there. Pre-deploy scans are useless once a bad mutation is actually live. If you don't have a way to auto-revert the infrastructure state instantly, you're just watching the fire spread.
reply