Skip to content
Tech News
← Back to articles

How the Trivy supply chain attack harvested credentials from secrets managers

read original get Trivy Security Scanner → more articles
Why This Matters

This supply chain attack on Aqua Security's Trivy highlights the increasing sophistication of cyber threats targeting development tools and the critical need for enhanced security measures in CI/CD pipelines. It underscores the importance for organizations to reevaluate their secrets management and security protocols to prevent credential exfiltration. As supply chain attacks become more prevalent, both the tech industry and consumers must prioritize securing development environments to safeguard sensitive data and maintain trust.

Key Takeaways

What happened

The anatomy of the attack

On March 19, 2026, Aqua Security's Trivy — one of the most widely used vulnerability scanners in the world — was compromised. Attackers injected credential-harvesting logic directly into the official release binary.

The payload was sophisticated: scans appeared to complete and pass normally. The credential exfiltration ran silently alongside legitimate functionality. Teams had no indication anything was wrong.

The attack didn't need to find a vulnerability in your code. It exploited the fact that your CI/CD pipeline runs tools with access to your environment — and your API keys live in that environment as plaintext strings.

This is the supply chain attack model that makes traditional secrets management insufficient: if the key exists as a plaintext string anywhere in your runtime environment, a compromised tool can find and exfiltrate it.