ANAVEM
Languagefr
Dark server room with blue glowing servers and one rack highlighted in red emergency lighting

Trivy Scanner Hit by Second Supply Chain Attack in Month

Aqua Security's Trivy vulnerability scanner suffered another supply chain compromise targeting GitHub Actions workflows and CI/CD secrets.

Evan MaelEvan Mael
20 March 2026, 18:47 4 min read 2

Last updated 20 March 2026, 22:00

SEVERITYHigh
EXPLOITActive Exploit
PATCH STATUSAvailable
VENDORAqua Security
AFFECTEDTrivy vulnerability scanner, a...
CATEGORYCyber Attacks

Key Takeaways

Trivy Scanner Faces Second Compromise in March 2026

Aqua Security's widely-used Trivy vulnerability scanner became the target of a sophisticated supply chain attack on March 20, 2026, marking the second security incident affecting the open-source tool within a single month. The compromise specifically targeted two critical GitHub Actions repositories: "aquasecurity/trivy-action" and "aquasecurity/setup-trivy," which collectively serve thousands of development teams worldwide for automated container security scanning.

The attack represents a concerning escalation in supply chain targeting, with threat actors demonstrating persistent focus on compromising popular DevSecOps tools. Trivy, which has become a cornerstone security scanner for Docker containers and Kubernetes deployments, processes millions of vulnerability scans daily across enterprise CI/CD pipelines. The tool's integration into GitHub Actions workflows makes it an attractive target for attackers seeking to infiltrate software development lifecycles.

Security researchers discovered the malicious code embedded within the GitHub Actions workflows was designed to exfiltrate sensitive CI/CD secrets, including API keys, authentication tokens, and deployment credentials. The malware operated by intercepting environment variables and secret values during the scanning process, then transmitting this data to attacker-controlled infrastructure. This technique allows cybercriminals to gain persistent access to development environments and potentially inject malicious code into production systems.

The timing of this second attack suggests either the same threat group returned after initial remediation efforts, or multiple adversaries are now targeting Trivy's supply chain. The previous compromise in February 2026 had already raised concerns about the security posture of critical open-source security tools, prompting many organizations to implement additional verification steps for their CI/CD pipelines.

Related: GlassWorm Malware Hijacks GitHub Tokens to Poison Python

Related: GitHub Accounts Breached in VS Code GlassWorm Aftermath

GitHub Actions Users and CI/CD Pipelines at Risk

Organizations using the compromised GitHub Actions face immediate exposure of their CI/CD secrets and development infrastructure. The "aquasecurity/trivy-action" repository alone has been integrated into over 50,000 public GitHub repositories, with enterprise usage likely extending this number significantly. Development teams running automated security scans through these actions between the compromise date and discovery window potentially had their secrets harvested by the malicious code.

The attack particularly impacts DevSecOps teams who rely on Trivy for container vulnerability assessment in their continuous integration workflows. Organizations using GitHub Enterprise Server, GitHub.com public repositories, and private repositories with these specific actions are all within the blast radius. The malware's focus on CI/CD secrets means attackers could have gained access to cloud service credentials, database connection strings, third-party API keys, and deployment tokens stored as GitHub secrets.

Enterprise environments with automated deployment pipelines face the highest risk, as compromised credentials could enable attackers to push malicious code directly into production systems. Financial services, healthcare, and technology companies that have adopted container-first development practices and rely heavily on automated security scanning are particularly vulnerable. The incident affects both direct users of the compromised actions and downstream consumers of any software built using these compromised workflows.

Immediate Response and Mitigation Steps for Trivy Users

Organizations must immediately audit their GitHub Actions workflows to identify usage of the compromised "aquasecurity/trivy-action" and "aquasecurity/setup-trivy" actions. Teams should review their GitHub Actions logs from March 15-20, 2026, looking for any unusual network connections or unexpected data transfers during Trivy scanning operations. All GitHub secrets and environment variables accessible to workflows using these actions should be considered potentially compromised and rotated immediately.

Aqua Security has released updated versions of both GitHub Actions with the malicious code removed and additional integrity checks implemented. Users should update to the latest versions and pin their action references to specific commit hashes rather than using branch references like "@main" or "@v1". The CISA Known Exploited Vulnerabilities catalog now includes guidance for supply chain compromise detection and response procedures that organizations should follow.

Security teams should implement additional monitoring for their CI/CD pipelines, including network traffic analysis during build processes and secret usage auditing. Organizations should also consider implementing GitHub's secret scanning features and requiring signed commits for critical repositories. For immediate protection, teams can temporarily switch to alternative vulnerability scanning tools or run Trivy in isolated environments without access to sensitive secrets until the security posture is fully restored.

Frequently Asked Questions

How do I check if my GitHub Actions used the compromised Trivy scanner?+
Review your repository's .github/workflows directory for any YAML files referencing 'aquasecurity/trivy-action' or 'aquasecurity/setup-trivy'. Check your Actions logs from March 15-20, 2026 for unusual network activity during Trivy scans.
What secrets could have been stolen from the Trivy supply chain attack?+
The malware targeted CI/CD secrets including API keys, authentication tokens, deployment credentials, cloud service keys, and database connection strings stored as GitHub secrets. Any environment variables accessible to the compromised workflows are potentially compromised.
Should I stop using Trivy vulnerability scanner after this attack?+
Aqua Security has released updated versions with the malicious code removed and additional security measures. You can continue using Trivy by updating to the latest versions and pinning action references to specific commit hashes rather than branch references.
Evan Mael
About the Author

Evan Mael

Senior IT Journalist & Cloud Architect

Microsoft MCSA-certified Cloud Architect | Fortinet-focused. I modernize cloud, hybrid & on-prem infrastructure for reliability, security, performance and cost control - sharing field-tested ops & troubleshooting.

Discussion

Share your thoughts and insights

You must be logged in to comment.

Loading comments...