Aqua Security Works with Sygnia to Remediate Trivy Supply Chain Attack Leveraging CI/CD Vulnerabilities that Expanded to Compromised Docker Images

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity Writer
Key Takeaways
  • Credential compromise: A Trivy supply chain attack leveraged compromised GitHub Action tokens to execute a sophisticated open-source security breach.
  • Malicious release: Threat actors modified existing version tags and published a malicious release of Trivy v0.69.4 to extract sensitive data.
  • Enterprise isolation: Aqua Security confirmed its commercial products remain completely unaffected by the CI/CD pipeline compromise impacting open-source tools.

Aqua Security engaged the global incident response firm Sygnia to conduct forensic analysis and validate remediation efforts regarding the recent sophisticated Trivy supply chain attack that compromised widely used GitHub Actions environments. Threat actors exploited a misconfiguration of the open-source security scanner to extract privileged access tokens, enabling them to infiltrate repository automation and deployment processes to steal sensitive developer data. 

Executing the Malicious Release

The attackers employed a stealthy approach as part of a six-stage attack methodology that started late February 2026. They force-pushed malicious commits over existing, trusted version tags within the aquasecurity/trivy-action and setup-trivy repositories. 

The compromised aqua-bot service account triggered the automated distribution of a malicious release designated as Trivy v0.69.4 on March 19, 2026, at around 17:43 UTC. The compromised workflows executed normally without alerting developers to the underlying code changes. 

High-level attack chain of this threat | Source: CrowdStrike
High-level attack chain of this threat | Source: CrowdStrike

During this silent execution, the malicious payload actively collected and exfiltrated sensitive information. Targeted data included API tokens, cloud credentials (AWS, GCP, Azure), SSH keys, Kubernetes tokens, Docker configuration files, Git credentials, and other secrets in CI/CD systems. Phoenix Security also noted the campaign debuted around February 26, 2026.

Trivy compromise timeline | Source: Phoenix Security
Trivy compromise timeline | Source: Phoenix Security

On March 22, Socket's threat research team identified additional compromised Trivy artifacts published to Docker Hub, following the GitHub Actions compromise of the aquasecurity/trivy-action repository, which Paul McCarty disclosed on the same day.

Socket noted that newly published Trivy Docker images 0.69.4, 0.69.5, and 0.69.6 were pushed to Docker Hub without corresponding GitHub releases and contained infostealer IOCs associated with the same TeamPCP observed earlier in this campaign.

The following open source components were affected and should be treated as potentially compromised:

The latest update stated that the company's commercial enterprise products operate on an architecturally isolated platform and remain unaffected by the breach. “The malicious Trivy v0.69.4 release was never incorporated into the commercial environment, and the GitHub-based attack path does not apply to the commercial build system,” the company said.

Attack Timeline

Here is the Trivy attack timeline, according to Aqua Security:

Mitigating the CI/CD Pipeline Compromise

The Trivy maintenance team immediately executed comprehensive containment protocols. Aqua Security deleted all malicious artifacts across GitHub Releases, Docker Hub, GHCR, and ECR, locked down automated actions, service accounts, and tokens, and repointed hijacked version tags to verified, safe commits.

Aqua Security’s commercial products were not impacted by this incident, including Trivy as delivered within the Aqua Platform. However, users of open source Trivy components outside the Aqua Platform should follow the remediation steps. Security experts recommend open-source users:

The latest Trivy supply chain attack follows a separate compromise affecting the Aqua Trivy VS Code extension distributed via OpenVSX, in which injected code attempted to exploit local AI coding agents. Aqua Security is an Israeli-American cloud security company founded in 2015.


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: