Settings

Theme

Trivy ecosystem supply chain temporarily compromised

github.com

102 points by batch12 a month ago · 41 comments

Reader

jl6 a month ago

To be clear, this is a supply chain attack on everyone that uses Trivy, not a supply chain attack on Trivy. It was a direct attack on Trivy, exploiting components that Aqua had full control and responsibility for. The term “supply chain attack” has a connotation of “it’s not really my fault, it was my dependencies that got compromised”.

Of course, every entity is ultimately accountable for its own security, including assigning a level of trust to any dependencies, so it’s ultimately no excuse, but getting hit by a supply chain attack does evoke a little more sympathy (“at least I did my bit right”), and I feel like the ambiguous wording of the title is trying to access some of that sympathy.

  • dec0dedab0de a month ago

    The term “supply chain attack” has a connotation of “it’s not really my fault, it was my dependencies that got compromised”.

    In my experience that is definitely not true, and I've never heard anyone use it that way. Even though you are correct in who the target was.

  • BrandoElFollito a month ago

    A supply chain attack is an attack on a provider of a solution that is then deployed further. The issue with a supply chain attack is that the ultimate victim brings in trusted software that was compromised upstream.

Shank a month ago

This attack seems predicated on a prior security incident (https://socket.dev/blog/unauthorized-ai-agent-execution-code...) at Trivy where they failed to successfully remediate and contain the damage. I think at this time, Trivy should’ve undertaken a full reassessment of risks and clearly isolated credentials and reduced risk systemically. This did not happen, and the second compromise occurred.

MilnerRoute a month ago

Briefly?

"Trivy Supply Chain Attack Spreads, Triggers Self-Spreading CanisterWorm Across 47 npm Packages"

https://it.slashdot.org/story/26/03/22/0039257/trivy-supply-...

  • zach_vantio a month ago

    "Briefly" is doing a lot of work there. Pre-deploy scans are useless once a bad mutation is actually live. If you don't have a way to auto-revert the infrastructure state instantly, you're just watching the fire spread.

  • brightball a month ago

    Seriously. All credentials compromised that it can see. It's active in CI/CD pipelines and follow on attacks are happening.

woodruffw a month ago

I don’t think “briefly compromised” is accurate. The short span between this and the previous compromise of trivy suggests that the attacker was able to persist between their two periods of activity.

AdrienPoupa a month ago

Don't forget to pin your GitHub Actions to SHAs instead of tags, that may or may not be immutable!

  • woodruffw a month ago

    Frustratingly, hash pinning isn’t good enough here: that makes the action immutable, but the action itself can still make mutable decisions (like pulling the “latest” version of a binary from somewhere on the internet). That’s what trivy’s official action appears to do.

    (IOW You definitely should still hash-pin actions, but doing so isn’t sufficient in all circumstances.)

feross a month ago

Lots more technical research about the actual attack and how it worked here: https://socket.dev/blog/trivy-under-attack-again-github-acti...

Disclosure: I’m the founder of Socket.

  • joecarpenter a month ago

    Great analysis!

    The Go binary was also compromised, but there's almost no information what the compromised binary did. Did it drop a python script? Did it do direct scanning?

    If trivy docker image was used, what's the scope (it does not include python).

snailmailman a month ago

Are the spam comments all from compromised accounts, presumably compromised due to this hack?

I only clicked on a handful of accounts but several of them have plausibly real looking profiles.

philipwhiuk a month ago

Sounds like Trivy is still compromised:

https://www.aquasec.com/blog/trivy-supply-chain-attack-what-...

h4kunamata a month ago

Still compromised: https://socket.dev/blog/trivy-under-attack-again-github-acti...

This is a very old vulnerability, and to see companies falling for it is mental.

The year is 2026 and companies are still using tag over hash. It is well known that you can release different code under the same tag without alerting users.

swq115 a month ago

The irony of your vulnerability scanner being the vulnerability.

RS-232 a month ago

Pretty ironic that the security tool is insecure

  • tptacek a month ago

    You must be new to this. The median line of code in a security tool is materially less secure than the median line of code overall in the industry.

    • regularfry a month ago

      Similarly one of our biggest causes of power outages when I worked with a DC was the UPSes. And the biggest causes of data loss were the hardware RAID controllers. Feels like there's a fundamental law lurking under this stuff.

      • snackbroken a month ago

        As the complexity of a system increases, the number of single points of failure also tends to increase. Sometimes you can make sure that several subsystems need to fail before the whole system fails. Often, the best you can do is swap one SPoF (e.g. unreliable power grid) for another, more robust SPoF (unreliable UPS).

    • CoderLuii a month ago

      this is painfully accurate. ive worked in security for years and the tools we trust the most get the least scrutiny because everyone assumes "well its a security tool, it must be secure." the irony is these tools usually run with the highest privileges in the pipeline. trivy sits in CI with access to every secret in your environment and nobody questions it because its supposed to be the thing protecting you.

tridion a month ago

Мы позвали царского дегустатора проверить суп на яд, но яд оказался на его ложке.

duckmysick a month ago

> credential rotation was performed but was not atomic (not all credentials were revoked simultaneously).

How do you simultaneously revoke all credentials of all your accounts spanning multiple services/machines/users?

4riel a month ago

yeah, we keep learning the same lesson: the tool that audits your supply chain is the single best target for compromising it

Keyboard Shortcuts

j
Next item
k
Previous item
o / Enter
Open selected item
?
Show this help
Esc
Close modal / clear selection