Threat actors successfully compromised the open-source security scanner Trivy to distribute malicious payloads. By embedding an infostealer within the tool's workflow, attackers gained the ability to harvest sensitive secrets directly from CI/CD environments. This allows for lateral movement into cloud infrastructure and source code repositories.
This incident represents a significant supply chain threat as it subverts a tool specifically designed to enhance security. The theft of CI/CD secrets provides attackers with persistent access to production environments and intellectual property. It highlights the inherent risks of relying on third-party dependencies within automated development pipelines.
Advisory purposes only · QPulse Security Intelligence Platform · 2026 · Brief #00409