Widespread GitHub Actions Tag Compromise Exposes CI/CD Secrets
A new supply chain attack targeting Trivy has compromised 75 out of 76 version tags in the aquasecurity/trivy-action GitHub repository. The attacker force-pushed these tags to serve malicious payloads, effectively turning trusted version references into a distribution mechanism for an infostealer. The malicious code executes within GitHub Actions runners, targeting sensitive data in CI/CD environments. It harvests secrets from runner process memory and the filesystem, encrypts the collected data, and exfiltrates it to an attacker-controlled endpoint or a fallback GitHub-based channel. The attack's scope is significant, potentially affecting over 10,000 workflow files on GitHub referencing this action.
AI Analysis
Technical Summary
This threat involves a sophisticated supply chain compromise targeting the aquasecurity/trivy-action GitHub repository, a popular GitHub Action used for security scanning in CI/CD pipelines. The attacker force-pushed malicious code to 75 out of 76 version tags, effectively hijacking trusted version references to distribute an infostealer payload. When these compromised tags are used in GitHub Actions workflows, the malicious code executes within the GitHub Actions runner environment. It targets sensitive secrets by harvesting credentials and other confidential data from the runner's process memory and filesystem. The stolen information is then encrypted and exfiltrated either to an attacker-controlled external endpoint or via a fallback channel hosted on GitHub infrastructure. The attack leverages multiple MITRE ATT&CK techniques, including credential dumping (T1555), process injection (T1059.004), and data exfiltration (T1041). The adversary behind this campaign is identified as TeamPCP, known for cloud credential theft. The attack's scale is significant, potentially impacting over 10,000 workflow files that reference the compromised action, thus affecting a broad range of organizations using GitHub Actions for CI/CD. No CVE or patch links are currently available, and no known exploits in the wild have been reported, indicating this is a newly discovered threat. The attack highlights the risks of supply chain compromises in software development pipelines and the critical need for securing CI/CD environments.
Potential Impact
The impact of this threat is substantial for organizations using the aquasecurity/trivy-action in their GitHub Actions workflows. By compromising trusted version tags, attackers can stealthily distribute malware that steals sensitive CI/CD secrets such as API keys, tokens, and credentials stored in environment variables or runner memory. This can lead to unauthorized access to cloud environments, code repositories, and other critical infrastructure. The exfiltrated credentials can facilitate further lateral movement, data breaches, or ransomware attacks. The widespread nature of the compromise means thousands of organizations globally could be affected, especially those relying heavily on GitHub Actions for automation and security scanning. The integrity of the CI/CD pipeline is undermined, potentially allowing attackers to inject malicious code into software builds or deployments. Additionally, the attack erodes trust in open-source actions and highlights the risk of supply chain attacks in modern DevOps practices.
Mitigation Recommendations
Organizations should immediately audit their GitHub Actions workflows to identify usage of the aquasecurity/trivy-action and avoid referencing compromised version tags. Pin workflows to specific, verified commit SHAs rather than mutable tags to prevent automatic pulling of malicious code. Rotate all secrets and tokens used in CI/CD environments that might have been exposed. Implement strict least privilege access for CI/CD secrets and use GitHub's encrypted secrets management features. Monitor GitHub Actions logs for unusual activity or unexpected network connections, especially to suspicious domains like scan.aquasecurtiy.org. Employ runtime security tools to detect anomalous behavior in CI/CD runners. Consider using third-party supply chain security tools to verify the integrity of GitHub Actions and dependencies. Engage with the action's maintainers and community for updates or official patches. Finally, educate developers and DevOps teams about the risks of supply chain attacks and best practices for securing CI/CD pipelines.
Affected Countries
United States, Germany, United Kingdom, Canada, France, Japan, Australia, Netherlands, India, South Korea
Indicators of Compromise
- hash: 57a97c7e7821a5776cebc9bb87c984fa69cba8f1
- hash: 18a24f83e807479438dcab7a1804c51a00dafc1d526698a66e0640d1e5dd671a
- url: https://scan.aquasecurtiy.org
- domain: scan.aquasecurtiy.org
Widespread GitHub Actions Tag Compromise Exposes CI/CD Secrets
Description
A new supply chain attack targeting Trivy has compromised 75 out of 76 version tags in the aquasecurity/trivy-action GitHub repository. The attacker force-pushed these tags to serve malicious payloads, effectively turning trusted version references into a distribution mechanism for an infostealer. The malicious code executes within GitHub Actions runners, targeting sensitive data in CI/CD environments. It harvests secrets from runner process memory and the filesystem, encrypts the collected data, and exfiltrates it to an attacker-controlled endpoint or a fallback GitHub-based channel. The attack's scope is significant, potentially affecting over 10,000 workflow files on GitHub referencing this action.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
This threat involves a sophisticated supply chain compromise targeting the aquasecurity/trivy-action GitHub repository, a popular GitHub Action used for security scanning in CI/CD pipelines. The attacker force-pushed malicious code to 75 out of 76 version tags, effectively hijacking trusted version references to distribute an infostealer payload. When these compromised tags are used in GitHub Actions workflows, the malicious code executes within the GitHub Actions runner environment. It targets sensitive secrets by harvesting credentials and other confidential data from the runner's process memory and filesystem. The stolen information is then encrypted and exfiltrated either to an attacker-controlled external endpoint or via a fallback channel hosted on GitHub infrastructure. The attack leverages multiple MITRE ATT&CK techniques, including credential dumping (T1555), process injection (T1059.004), and data exfiltration (T1041). The adversary behind this campaign is identified as TeamPCP, known for cloud credential theft. The attack's scale is significant, potentially impacting over 10,000 workflow files that reference the compromised action, thus affecting a broad range of organizations using GitHub Actions for CI/CD. No CVE or patch links are currently available, and no known exploits in the wild have been reported, indicating this is a newly discovered threat. The attack highlights the risks of supply chain compromises in software development pipelines and the critical need for securing CI/CD environments.
Potential Impact
The impact of this threat is substantial for organizations using the aquasecurity/trivy-action in their GitHub Actions workflows. By compromising trusted version tags, attackers can stealthily distribute malware that steals sensitive CI/CD secrets such as API keys, tokens, and credentials stored in environment variables or runner memory. This can lead to unauthorized access to cloud environments, code repositories, and other critical infrastructure. The exfiltrated credentials can facilitate further lateral movement, data breaches, or ransomware attacks. The widespread nature of the compromise means thousands of organizations globally could be affected, especially those relying heavily on GitHub Actions for automation and security scanning. The integrity of the CI/CD pipeline is undermined, potentially allowing attackers to inject malicious code into software builds or deployments. Additionally, the attack erodes trust in open-source actions and highlights the risk of supply chain attacks in modern DevOps practices.
Mitigation Recommendations
Organizations should immediately audit their GitHub Actions workflows to identify usage of the aquasecurity/trivy-action and avoid referencing compromised version tags. Pin workflows to specific, verified commit SHAs rather than mutable tags to prevent automatic pulling of malicious code. Rotate all secrets and tokens used in CI/CD environments that might have been exposed. Implement strict least privilege access for CI/CD secrets and use GitHub's encrypted secrets management features. Monitor GitHub Actions logs for unusual activity or unexpected network connections, especially to suspicious domains like scan.aquasecurtiy.org. Employ runtime security tools to detect anomalous behavior in CI/CD runners. Consider using third-party supply chain security tools to verify the integrity of GitHub Actions and dependencies. Engage with the action's maintainers and community for updates or official patches. Finally, educate developers and DevOps teams about the risks of supply chain attacks and best practices for securing CI/CD pipelines.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://socket.dev/blog/trivy-under-attack-again-github-actions-compromise"]
- Adversary
- TeamPCP
- Pulse Id
- 69bd18a7cc27dfdfaf6f56a4
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash57a97c7e7821a5776cebc9bb87c984fa69cba8f1 | — | |
hash18a24f83e807479438dcab7a1804c51a00dafc1d526698a66e0640d1e5dd671a | — |
Url
| Value | Description | Copy |
|---|---|---|
urlhttps://scan.aquasecurtiy.org | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainscan.aquasecurtiy.org | — |
Threat ID: 69bdb74ce32a4fbe5fd0512f
Added to database: 3/20/2026, 9:08:28 PM
Last enriched: 3/20/2026, 9:23:42 PM
Last updated: 3/21/2026, 3:03:27 AM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.