Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Widespread GitHub Actions Tag Compromise Exposes CI/CD Secrets

0
Medium
Published: Fri Mar 20 2026 (03/20/2026, 09:51:35 UTC)
Source: AlienVault OTX General

Description

A new supply chain attack targeting Trivy has compromised 75 out of 76 version tags in the aquasecurity/trivy-action GitHub repository. The attacker force-pushed these tags to serve malicious payloads, effectively turning trusted version references into a distribution mechanism for an infostealer. The malicious code executes within GitHub Actions runners, targeting sensitive data in CI/CD environments. It harvests secrets from runner process memory and the filesystem, encrypts the collected data, and exfiltrates it to an attacker-controlled endpoint or a fallback GitHub-based channel. The attack's scope is significant, potentially affecting over 10,000 workflow files on GitHub referencing this action.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/20/2026, 21:23:42 UTC

Technical Analysis

This threat involves a sophisticated supply chain compromise targeting the aquasecurity/trivy-action GitHub repository, a popular GitHub Action used for security scanning in CI/CD pipelines. The attacker force-pushed malicious code to 75 out of 76 version tags, effectively hijacking trusted version references to distribute an infostealer payload. When these compromised tags are used in GitHub Actions workflows, the malicious code executes within the GitHub Actions runner environment. It targets sensitive secrets by harvesting credentials and other confidential data from the runner's process memory and filesystem. The stolen information is then encrypted and exfiltrated either to an attacker-controlled external endpoint or via a fallback channel hosted on GitHub infrastructure. The attack leverages multiple MITRE ATT&CK techniques, including credential dumping (T1555), process injection (T1059.004), and data exfiltration (T1041). The adversary behind this campaign is identified as TeamPCP, known for cloud credential theft. The attack's scale is significant, potentially impacting over 10,000 workflow files that reference the compromised action, thus affecting a broad range of organizations using GitHub Actions for CI/CD. No CVE or patch links are currently available, and no known exploits in the wild have been reported, indicating this is a newly discovered threat. The attack highlights the risks of supply chain compromises in software development pipelines and the critical need for securing CI/CD environments.

Potential Impact

The impact of this threat is substantial for organizations using the aquasecurity/trivy-action in their GitHub Actions workflows. By compromising trusted version tags, attackers can stealthily distribute malware that steals sensitive CI/CD secrets such as API keys, tokens, and credentials stored in environment variables or runner memory. This can lead to unauthorized access to cloud environments, code repositories, and other critical infrastructure. The exfiltrated credentials can facilitate further lateral movement, data breaches, or ransomware attacks. The widespread nature of the compromise means thousands of organizations globally could be affected, especially those relying heavily on GitHub Actions for automation and security scanning. The integrity of the CI/CD pipeline is undermined, potentially allowing attackers to inject malicious code into software builds or deployments. Additionally, the attack erodes trust in open-source actions and highlights the risk of supply chain attacks in modern DevOps practices.

Mitigation Recommendations

Organizations should immediately audit their GitHub Actions workflows to identify usage of the aquasecurity/trivy-action and avoid referencing compromised version tags. Pin workflows to specific, verified commit SHAs rather than mutable tags to prevent automatic pulling of malicious code. Rotate all secrets and tokens used in CI/CD environments that might have been exposed. Implement strict least privilege access for CI/CD secrets and use GitHub's encrypted secrets management features. Monitor GitHub Actions logs for unusual activity or unexpected network connections, especially to suspicious domains like scan.aquasecurtiy.org. Employ runtime security tools to detect anomalous behavior in CI/CD runners. Consider using third-party supply chain security tools to verify the integrity of GitHub Actions and dependencies. Engage with the action's maintainers and community for updates or official patches. Finally, educate developers and DevOps teams about the risks of supply chain attacks and best practices for securing CI/CD pipelines.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://socket.dev/blog/trivy-under-attack-again-github-actions-compromise"]
Adversary
TeamPCP
Pulse Id
69bd18a7cc27dfdfaf6f56a4
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash57a97c7e7821a5776cebc9bb87c984fa69cba8f1
hash18a24f83e807479438dcab7a1804c51a00dafc1d526698a66e0640d1e5dd671a

Url

ValueDescriptionCopy
urlhttps://scan.aquasecurtiy.org

Domain

ValueDescriptionCopy
domainscan.aquasecurtiy.org

Threat ID: 69bdb74ce32a4fbe5fd0512f

Added to database: 3/20/2026, 9:08:28 PM

Last enriched: 3/20/2026, 9:23:42 PM

Last updated: 3/21/2026, 3:03:27 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses