Trivy Security incident 2026-03-19 conclusion #10462
Pinned
itaysk
announced in
Announcements
Replies: 3 comments 2 replies
-
|
thank you @itaysk and AquaSecurity for being transparent and sharing the lessson for the community. It's very valuable for any open source projects to learn from and not making the same mistakes. |
Beta Was this translation helpful? Give feedback.
1 reply
-
Beta Was this translation helpful? Give feedback.
1 reply
-
|
@itaysk Thanks for all these explanations. What is your current level of confidence that everything the attackers touched in your environment has been cleaned ? Do you have still some twilight zones ? |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment

Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
This is a continuation of #10425
Dear Trivy community,
The past few weeks have been stressful for all of us as the Trivy project, and by extension its users, were targeted in a cyber-attack. First, we want to apologize. Trivy has earned the trust of many around the world, and while the security value it provides is significant, we did not meet the standard expected from us. We focused on delivering the best product but failed to adequately protect its supply chain and to respond as effectively as we should have. Since then, we have been working around the clock to investigate and remediate the incident and as a result we were brief with communications. Now that the situation is stable, we want to share our findings, the steps we have taken, and the lessons learned.
Current status
We have completed an investigation with third part incident response experts, and comprehensive review with third-party auditors of the full security posture of Trivy and its supporting infrastructure. The actions below reflect partial list of both immediate remediation and longer-term hardening measures:
1. Credential Reset
We performed a full credential reset:
What this means:
All previously issued credentials are no longer valid. New access is heavily scrutinized.
2. Hardened Release Pipeline
We updated the release process to reduce the risk of unintended or unauthorized changes:
What this means:
New releases are produced through a more secure pipeline.
3. Artifact Immutability and Integrity Controls
We applied measures to prevent the risk of future changes:
What this means:
New releases have stronger protection against post-publication changes, and users have the tools to verify the integrity of released artifacts.
4. Access Model Hardening
We updated the access model to reduce risk and improve control:
What this means:
Access is now more tightly controlled.
5. Continuous Monitoring and Response
We introduced additional monitoring and response capabilities:
What this means:
We now have improved visibility into the release pipeline and faster detection and response of unexpected changes.
Next steps
These changes are now part of our baseline, and we will continue to reevaluate and challenge our security posture and practices across the board.
We are gradually resuming normal operation now, starting with vuln-list trackers and trivy-db releases.
Lessons learned
This attack could be attributed to many different factors, but we have identified few major reasons that contributed to the large impact of the attack, and made the initial response inefficient:
These lessons are being incorporated into our security and release practices.
Timeline of events
Beta Was this translation helpful? Give feedback.
All reactions