Close Menu
    Main Menu
    • Home
    • News
    • Tech
    • Robotics
    • ML & Research
    • AI
    • Digital Transformation
    • AI Ethics & Regulation
    • Thought Leadership in AI

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Pricing Construction and Most important Capabilities

    March 21, 2026

    Trivy vulnerability scanner backdoored with credential stealer in provide chain assault

    March 21, 2026

    Minecraft is getting its first-ever theme park land

    March 21, 2026
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Home»AI Ethics & Regulation»Trivy vulnerability scanner backdoored with credential stealer in provide chain assault
    AI Ethics & Regulation

    Trivy vulnerability scanner backdoored with credential stealer in provide chain assault

    Declan MurphyBy Declan MurphyMarch 21, 2026No Comments1 Min Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Trivy vulnerability scanner backdoored with credential stealer in provide chain assault
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link



    A number of elements backdoored

    Trivy, developed by Aqua Safety, is without doubt one of the most generally used open-source vulnerability scanners, with over 32,000 GitHub stars and greater than 100 million Docker Hub downloads. Builders use it to detect vulnerabilities and uncovered secrets and techniques of their CI/CD pipelines and container photographs.

    The attackers compromised three elements of the Trivy mission: trivy-action, the official GitHub Motion for operating Trivy scans in CI/CD workflows; setup-trivy, a helper motion for putting in the scanner; and the Trivy binary itself. Backdoored artifacts have been revealed to GitHub releases, Docker Hub, the GitHub Container Registry, and the Amazon Elastic Container Registry.

    In accordance with Socket, 75 of 76 model tags in trivy-action have been overwritten with malicious code, together with seven tags in setup-trivy. The one unaffected trivy-action tag was model 0.35.0. The compromised tags embrace extensively used variations resembling 0.34.2, 0.33.0, and 0.18.0.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Declan Murphy
    • Website

    Related Posts

    MIWIC26: Dr. Chidimma Opara, Laptop Science Lecturer at Teesside College

    March 21, 2026

    Lazarus Group Bitrefill Cyberattack Crypto Risk

    March 21, 2026

    Hacker Group LAPSUS$ Claims Alleged AstraZeneca Information Breach

    March 21, 2026
    Top Posts

    Evaluating the Finest AI Video Mills for Social Media

    April 18, 2025

    Utilizing AI To Repair The Innovation Drawback: The Three Step Resolution

    April 18, 2025

    Midjourney V7: Quicker, smarter, extra reasonable

    April 18, 2025

    Meta resumes AI coaching utilizing EU person knowledge

    April 18, 2025
    Don't Miss

    Pricing Construction and Most important Capabilities

    By Amelia Harper JonesMarch 21, 2026

    My Tales creates a setting the place customers can talk brazenly inside a well-structured and…

    Trivy vulnerability scanner backdoored with credential stealer in provide chain assault

    March 21, 2026

    Minecraft is getting its first-ever theme park land

    March 21, 2026

    Why Brokers Fail: The Position of Seed Values and Temperature in Agentic Loops

    March 21, 2026
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    UK Tech Insider
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms Of Service
    • Our Authors
    © 2026 UK Tech Insider. All rights reserved by UK Tech Insider.

    Type above and press Enter to search. Press Esc to cancel.