ATLA WIRE

Trivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets

21.03.2026
6762
Trivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets
Trivy attack force-pushed 75 tags via GitHub Actions, exposing CI/CD secrets, enabling data theft and persistence across developer systems.

Trivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets

Yikes — the Trivy security scanner just got hit with a massive supply chain attack. Hackers compromised GitHub Actions, force-pushed 75 tags, and are now siphoning CI/CD secrets from dev pipelines. This isn't just a breach — it's a full-blown infiltration of your build system.
Article image 1
Here's the breakdown: attackers hijacked the Trivy GitHub Actions workflow, pushing malicious tags that execute during CI/CD runs. Once triggered, these tags exfiltrate sensitive data — think API keys, tokens, and credentials — straight to attacker-controlled servers. This isn't just data theft; it's persistence across developer environments.
  • 75 tags force-pushed via compromised GitHub Actions
  • CI/CD secrets exposed and exfiltrated
  • Attack enables data theft and system persistence
  • Targets Trivy, a popular open-source security scanner
  • Impacts DevSecOps and cloud security pipelines
The attack vector? Classic supply chain manipulation. By compromising the GitHub Actions that manage Trivy's tags, attackers injected malicious code into the CI/CD pipeline. Every time a developer runs a scan, the malicious tag executes — silently stealing secrets and potentially deploying backdoors.
This is a wake-up call for the DevSecOps community. Trivy is widely used for vulnerability scanning in containers and cloud environments. A breach here doesn't just leak data — it compromises the entire security posture of organizations relying on it. Think about it: your security tool is now the attack vector.
Key takeaway: monitor your CI/CD workflows like a hawk. Verify tag integrity, audit GitHub Actions permissions, and assume your secrets are always at risk. This attack shows that even security tools aren't immune — they're just another target in the supply chain.
#CI/CD безопасность#DevSecOps#GitHub#атаки по цепочке поставок#взлом
Есть тема? Пишите ATLA WIRE в Telegram:t.me/atla_community
Banner | ATLA WIRE
ATLA WIRE