| ▲ | Trivy ecosystem supply chain briefly compromised(github.com) | ||||||||||||||||||||||||||||||||||||||||
| 73 points by batch12 2 days ago | 23 comments | |||||||||||||||||||||||||||||||||||||||||
| ▲ | jl6 2 hours ago | parent | next [-] | ||||||||||||||||||||||||||||||||||||||||
To be clear, this is a supply chain attack on everyone that uses Trivy, not a supply chain attack on Trivy. It was a direct attack on Trivy, exploiting components that Aqua had full control and responsibility for. The term “supply chain attack” has a connotation of “it’s not really my fault, it was my dependencies that got compromised”. Of course, every entity is ultimately accountable for its own security, including assigning a level of trust to any dependencies, so it’s ultimately no excuse, but getting hit by a supply chain attack does evoke a little more sympathy (“at least I did my bit right”), and I feel like the ambiguous wording of the title is trying to access some of that sympathy. | |||||||||||||||||||||||||||||||||||||||||
| ▲ | Shank 8 hours ago | parent | prev | next [-] | ||||||||||||||||||||||||||||||||||||||||
This attack seems predicated on a prior security incident (https://socket.dev/blog/unauthorized-ai-agent-execution-code...) at Trivy where they failed to successfully remediate and contain the damage. I think at this time, Trivy should’ve undertaken a full reassessment of risks and clearly isolated credentials and reduced risk systemically. This did not happen, and the second compromise occurred. | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
| ▲ | woodruffw 6 hours ago | parent | prev | next [-] | ||||||||||||||||||||||||||||||||||||||||
I don’t think “briefly compromised” is accurate. The short span between this and the previous compromise of trivy suggests that the attacker was able to persist between their two periods of activity. | |||||||||||||||||||||||||||||||||||||||||
| ▲ | AdrienPoupa 7 hours ago | parent | prev | next [-] | ||||||||||||||||||||||||||||||||||||||||
Don't forget to pin your GitHub Actions to SHAs instead of tags, that may or may not be immutable! | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
| ▲ | swq115 4 hours ago | parent | prev | next [-] | ||||||||||||||||||||||||||||||||||||||||
The irony of your vulnerability scanner being the vulnerability. | |||||||||||||||||||||||||||||||||||||||||
| ▲ | 4riel an hour ago | parent | prev | next [-] | ||||||||||||||||||||||||||||||||||||||||
yeah, we keep learning the same lesson: the tool that audits your supply chain is the single best target for compromising it | |||||||||||||||||||||||||||||||||||||||||
| ▲ | snailmailman 10 hours ago | parent | prev | next [-] | ||||||||||||||||||||||||||||||||||||||||
Are the spam comments all from compromised accounts, presumably compromised due to this hack? I only clicked on a handful of accounts but several of them have plausibly real looking profiles. | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
| ▲ | RS-232 8 hours ago | parent | prev | next [-] | ||||||||||||||||||||||||||||||||||||||||
Pretty ironic that the security tool is insecure | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
| ▲ | MilnerRoute 9 hours ago | parent | prev [-] | ||||||||||||||||||||||||||||||||||||||||
Briefly? "Trivy Supply Chain Attack Spreads, Triggers Self-Spreading CanisterWorm Across 47 npm Packages" https://it.slashdot.org/story/26/03/22/0039257/trivy-supply-... | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||