Supply Chain Attack on Trivy

tiri 11 points 3 comments March 22, 2026
www.wiz.io · View on Hacker News

Discussion Highlights (1 comments)

wilkystyle

I have generally preferred to avoid using community-maintained actions as far as possible, instead installing and configuring the runners as though I would a normal machine. This started from a desire to avoid an unknown amount of bloat and untrusted code, but also because I'm pretty tired of getting Node deprecation warnings for installing/using something that has nothing to do with JavaScript at all. I've always installed a pinned version of Trivy of my choosing, and installed by curl | sh. Looks like curl | sh may have saved my skin, whereas even older versions of the github action were force-pushed to install the vulnerable binary.

Semantic search powered by Rivestack pgvector
3,471 stories · 32,344 chunks indexed