Trivy was attacked. The attack timeline briefly aligns with the release of version v9.4.0.
As part of the attack, Trivy releases were deleted - after the megalinter v9.4.0. The attack started before the release.
Here is a simplified timeline:
| Time (UTC) |
Event |
| Feb 27, 00:18 |
PR #10252 created and immediately closed, triggering CI |
| Feb 27, 12:01 |
Unauthorized API activity begins using compromised PAT |
| Feb 27, 12:36 |
Malicious security advisory created in trivy-vscode-extension |
| Feb 28, 03:17 |
hackerbot-claw PR created and closed |
| Mar 1, 00:14 |
Mass deletion of releases via script |
| Mar 1, 00:27 |
Repository renamed, fake repository created |
Details:
https://github.com/aquasecurity/trivy/discussions/10265
Based on the shared timeline, the megalinter v9.4.0 is likely not affected. I didn't dig deeper into it.
Trivy plans to restore releases, etc.
The goal of this issue is to create awareness. It might be good to check the next update more closely.
Trivy was attacked. The attack timeline briefly aligns with the release of version v9.4.0.
As part of the attack, Trivy releases were deleted - after the megalinter v9.4.0. The attack started before the release.
Details:
https://github.com/aquasecurity/trivy/discussions/10265
Based on the shared timeline, the megalinter v9.4.0 is likely not affected. I didn't dig deeper into it.
Trivy plans to restore releases, etc.
The goal of this issue is to create awareness. It might be good to check the next update more closely.