chore(deps): update aquasecurity/trivy-action action to v0.35.0 [security]#766
Open
renovate[bot] wants to merge 1 commit intomainfrom
Open
chore(deps): update aquasecurity/trivy-action action to v0.35.0 [security]#766renovate[bot] wants to merge 1 commit intomainfrom
renovate[bot] wants to merge 1 commit intomainfrom
Conversation
auto-merge was automatically disabled
March 25, 2026 11:54
Pull request was closed
13be44b to
1ddfc3b
Compare
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
0.34.0→0.35.0GitHub Vulnerability Alerts
CVE-2026-33634
Summary
On March 19, 2026, a threat actor used compromised credentials to publish a malicious Trivy v0.69.4 release, force-push 76 of 77 version tags in
aquasecurity/trivy-actionto credential-stealing malware, and replace all 7 tags inaquasecurity/setup-trivywith malicious commits.On March 22, 2026, a threat actor used compromised credentials to publish a malicious Trivy v0.69.5 and v0.69.6 DockerHub images.
Exposure Window
Affected Components
Note that all malicious components, artifacts, commits, etc have been removed from all sources and destinations (yet they may linger in intermediary caches). Use this information to understand if you have been exposed to the malicious artifacts during the exposure window.
trivybinary and imageUsers are affected if they utilized:
Users are not affected if they utilized:
brew install trivy)aquasecurity/trivy-actionGitHub ActionUsers are affected if they utilized:
version: latestparameter explicitly (not the default) during the trivy binary exposure window.Users are not affected if they utilized:
aquasecurity/setup-trivyGitHub ActionUsers are affected if they utilized:
Users are not affected if they utilized:
Attack Details
Root Cause
This incident is a continuation of the supply chain attack that began in late February 2026. Following the initial disclosure on March 1, credential rotation was performed but was not atomic (not all credentials were revoked simultaneously). The attacker could have use a valid token to exfiltrate newly rotated secrets during the rotation window (which lasted a few days). This could have allowed the attacker to retain access and execute the March 19 attack.
Trivy v0.69.4 binary and container images
The attacker created a malicious release by:
1885610c) that swapped theactions/checkoutreference to an imposter commit (70379aad) containing a composite action that downloaded malicious Go source files from a typosquatted domain--skip=validateto goreleaser to bypass binary validationv0.69.4, triggering the release pipelineThe compromised release was distributed across Trivy's regular distribution channels channels: GHCR, ECR Public, Docker Hub (both
0.69.4andlatesttags), deb/rpm packages, andget.trivy.dev.The attacker attempted to release a v0.70.0 malicious release but that was stopped prematurely.
trivy-action tag hijacking
The attacker force-pushed 76 of 77 version tags to malicious commits that injected an infostealer into
entrypoint.sh. The malicious code executes before the legitimate Trivy scan and does the following:Runner.Workerprocess memory via/proc/<pid>/memto extract secrets. Sweeps 50+ filesystem paths for SSH keys, AWS/GCP/Azure credentials, Kubernetes tokens, Docker configs,.envfiles, database credentials, and cryptocurrency wallets.INPUT_GITHUB_PATis set, creates a publictpcp-docsrepository on the victim's GitHub account and uploads stolen data as a release asset.setup-trivy release replacement
All 7 existing tags (v0.2.0 – v0.2.6) were force-pushed to malicious commits. The malicious
action.yamlcontained the same infostealer as trivy-action, injected as a "Setup environment" step that executes before the legitimate Trivy installation.We have removed all malicious releases within ~4 hours and re-created v0.2.6 with safe content. Tags v0.2.0 – v0.2.5 were not restored.
Trivy v0.69.5 and v0.69.6 docker image published.
The attacker created
aquasec/trivy:0.69.5andaquasec/trivy:0.69.6with the same C2 domain as thev0.69.4payload, and pushed them directly to Docker Hub using separately-compromised Docker Hub credentials (not via GitHub). No corresponding GitHub tags or releases existed.We have removed all tags related to
0.69.5and0.69.6and restored the latest tag to the safe0.69.3tag.Recommended Actions
Update to Known-Safe Versions
Regarding trivy-action: The original tags (
0.0.1–0.34.2) were deleted during remediation. Because the attacker's force-push caused these tags to be treated as immutable releases by GitHub, they cannot be re-created with the same names. New tags have been published with avprefix (v0.0.1–v0.34.2) pointing to the original legitimate commits. Three tags:v0.0.10,v0.34.1, andv0.34.2have not yet been restored. If you need to reference a version older than 0.35.0, use thev-prefixed tag (e.g.,aquasecurity/trivy-action@v0.34.0instead of@0.34.0).Rotate All Potentially Exposed Secrets
Based on information shared above, if there is any possibility that a compromised version ran in a project's environment, all secrets accessible to affected pipelines must be treated as exposed and rotated immediately.
Audit Trivy Versions
Check whether a project's organization pulled or executed Trivy v0.69.4 from any source. Remove any affected artifacts immediately.
Audit GitHub Action References
Review all workflows using
aquasecurity/trivy-actionoraquasecurity/setup-trivy. Check workflow run logs from March 19–20, 2026 for signs of compromise.Search for Exfiltration Artifacts
Look for repositories named
tpcp-docsin project's GitHub organization. The presence of such a repository may indicate that the fallback exfiltration mechanism was triggered and secrets were successfully stolen.Pin GitHub Actions to Full SHA Hashes
Pin GitHub Actions to full, immutable commit SHA hashes, don't use mutable version tags. As described here: https://docs.github.com/en/actions/reference/security/secure-use#using-third-party-actions
How to Verify Existing Installations
Binary verification
Container image verification
Resources
Release Notes
aquasecurity/trivy-action (aquasecurity/trivy-action)
v0.35.0: Release: v0.35.0Compare Source
This release is a duplicate of 0.35.0 which was not compromised.
As part of our response to the recent supply chain attack, we have migrated all tags to use the
vprefix (e.g.,v0.35.0instead of0.35.0). Going forward, all new releases will use thevprefix convention.We have intentionally kept the
0.35.0tag intact to avoid breaking existing workflows that depend on it.If you are currently using
0.35.0, your workflows are safe — no action is required.v0.35.0Compare Source
What's Changed
Full Changelog: aquasecurity/trivy-action@0.34.2...0.35.0
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Never, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.
Footnotes
Time when v0.69.4 release artifacts became publicly available. The malicious tag was pushed at ~17:43 UTC, triggering the release pipeline. ↩
Earliest suspicious activity observed in our audit log. ↩ ↩2