How the Trivy supply chain attack harvested credentials from secrets managers
Rial_Labs
16 points
15 comments
April 09, 2026
Related Discussions
Found 5 related stories in 53.0ms across 4,075 title embeddings via pgvector HNSW
- Supply Chain Attack on Trivy tiri · 11 pts · March 22, 2026 · 80% similar
- European Commission cloud breach: a supply-chain compromise Sandman · 16 pts · April 04, 2026 · 63% similar
- Cisco source code stolen in Trivy-linked dev environment breach _____k · 22 pts · March 31, 2026 · 61% similar
- Attempts to post the latest Trivy security incident have been marked [dead] JoshuaDavid · 80 pts · March 21, 2026 · 56% similar
- The Axios supply chain attack used individually targeted social engineering cmitsakis · 36 pts · April 03, 2026 · 54% similar
Discussion Highlights (5 comments)
Rial_Labs
Author here. Built VaultProof after analyzing the Trivy attack the credential harvesting worked specifically because the keys existed as plaintext in the CI/CD environment after retrieval from the secrets manager. Happy to go deep on the Shamir architecture or the attack mechanics if useful.
wernerb
Regarding GitHub actions and it's secret manager. Any decently organized company would do well to stay away from well known secret interfaces. Instead use oidc auth to fetch secrets just in time, all short-lived for the duration of the pipeline.
dboreham
Well...obviously secrets available in the runtime environment of a CI job are vulnerable to attacks that can compromise the runtime environment. I think everyone knew that. Also GitHub actions that come from less than unreproachable sources (GitHub themselves, ?) have always been an obvious attack vector. In places I've worked where we were concerned about this we forked all the actions repos into our own org so we could never pick up mystery meat in our jobs.
figmert
Leaving aside the fact that this is an ad thinly veiled as an article, OneCli does the same, and recently NanoClaw made OneCli setup their default.
alierfan
The technical breakdown of the Trivy attack is a great reminder that our security is only as strong as our version pinning. We all know we should pin to SHA-256 hashes instead of mutable tags, but the UX for managing and updating those hashes is still painful enough that most teams default to tags. Until the tooling makes 'doing the right thing' as easy as @v1, these supply chain leaks will continue to be a high-ROI path for attackers.