Trivy ecosystem supply chain briefly compromised

(github.com)

47 points | by batch12 2 days ago

7 comments

  • AdrienPoupa 1 hour ago
    Don't forget to pin your GitHub Actions to SHAs instead of tags, that may or may not be immutable!
    • woodruffw 47 minutes ago
      Frustratingly, hash pinning isn’t good enough here: that makes the action immutable, but the action itself can still make mutable decisions (like pulling the “latest” version of a binary from somewhere on the internet). That’s what trivy’s official action appears to do.

      (IOW You definitely should still hash-pin actions, but doing so isn’t sufficient in all circumstances.)

  • Shank 2 hours ago
    This attack seems predicated on a prior security incident (https://socket.dev/blog/unauthorized-ai-agent-execution-code...) at Trivy where they failed to successfully remediate and contain the damage. I think at this time, Trivy should’ve undertaken a full reassessment of risks and clearly isolated credentials and reduced risk systemically. This did not happen, and the second compromise occurred.
  • snailmailman 4 hours ago
    Are the spam comments all from compromised accounts, presumably compromised due to this hack?

    I only clicked on a handful of accounts but several of them have plausibly real looking profiles.

  • MilnerRoute 3 hours ago
    Briefly?

    "Trivy Supply Chain Attack Spreads, Triggers Self-Spreading CanisterWorm Across 47 npm Packages"

    https://it.slashdot.org/story/26/03/22/0039257/trivy-supply-...

    • zach_vantio 2 hours ago
      "Briefly" is doing a lot of work there. Pre-deploy scans are useless once a bad mutation is actually live. If you don't have a way to auto-revert the infrastructure state instantly, you're just watching the fire spread.
    • brightball 2 hours ago
      Seriously. All credentials compromised that it can see. It's active in CI/CD pipelines and follow on attacks are happening.
  • RS-232 2 hours ago
    Pretty ironic that the security tool is insecure
    • tptacek 2 hours ago
      You must be new to this. The median line of code in a security tool is materially less secure than the median line of code overall in the industry.
  • woodruffw 51 minutes ago
    [dead]
  • robutsume 3 hours ago
    [dead]