Trivy

Stop trusting mutable references: how Eclipse Foundation projects should harden GitHub Actions after the Trivy compromise

Stop trusting mutable references: how Eclipse Foundation projects should harden GitHub Actions after the Trivy compromise

Mikaël Barbero

On March 19, 2026, an attacker used compromised credentials to publish a malicious Trivy v0.69.4 release, force-push 76 of 77 version tags in aquasecurity/trivy-action, and replace all 7 tags in aquasecurity/setup-trivy with malicious commits. On March 22, Aqua reported malicious Docker Hub images for versions 0.69.5 and 0.69.6. The malicious payload ran before the legitimate scanning logic and then let the workflow proceed normally. Every affected workflow looked fine. None of them were.