🗳️ Vote for us on PodRadar Security Theatre Exposed — Passkeys, the CISA Leak & Your Cyber Insurance Vote now →
Developer pipeline dashboard showing a trusted security scanner turned into a supply chain attack risk

Cyber Security News

Your Build Pipeline Just Betrayed You: Why the Trivy Supply Chain Attack Should Alarm UK Businesses

You buy a security tool because you want fewer problems.

Then one day that security tool becomes the problem.

That is the bit that should make every UK business owner, IT manager, MSP, and developer sit up a little straighter today. The Trivy supply chain attack was not some cute academic trick. It was a brutal reminder that trust inside modern software delivery is often built on stale habits, over privileged automation, and the sort of blind faith that belongs in a cult, not a CI pipeline.

If your business builds software, scans containers, runs GitHub Actions, or relies on third party code in any way, and yes, that is almost everybody now, this story matters. You might not write code yourself. You might buy a service, outsource development, or use a SaaS platform built by someone else. Either way, your business still sits downstream from this mess.

So what happened?

On 19 March 2026, Aqua Security said a threat actor used compromised credentials to publish malicious Trivy version 0.69.4 and poison trivy-action and setup-trivy. This was not a clumsy smash and grab. The attacker force pushed 76 of 77 version tags in trivy-action and all seven tags in setup-trivy, then pushed malicious code through a path many teams already trusted. CrowdStrike said the poisoned action silently ran a credential stealer before the real scan, so workflows looked normal while secrets walked out of the building.

That sentence should concern you.

The workflow looked normal.

How many times have you heard somebody say, “Nothing seemed wrong”? That phrase should be printed on the gravestone of half the breaches in this country.

The ugly genius of this attack sits in one awful truth. Modern pipelines trust too much. They trust tags. They trust bots. They trust automation accounts. They trust that a tool called “security” must itself be safe. They trust that because a job completed successfully, nothing nasty happened in the background.

That is fantasy.

Aqua’s own update says any workflow that used the affected releases in the relevant window should be treated as potentially compromised, and that all secrets accessible to those runner environments must be considered exposed. Read that again. Not maybe exposed. Not possibly fine. Consider them exposed.

That means cloud credentials. API tokens. SSH keys. Kubernetes tokens. Docker config. Git credentials. The sort of digital keys that let a threat actor move from “interesting developer mishap” to “full blown business crisis” at speed.

Why should a UK small or mid sized business care?

Because the UK is packed with firms who now rely on software delivery whether they admit it or not. Marketing agencies deploy websites. SaaS firms ship features daily. Managed service providers automate client platforms. Manufacturers have development teams bolted onto operations. Finance, legal, retail, logistics, and healthcare suppliers all depend on applications, scripts, plugins, APIs, and cloud pipelines. Even if you are not “a software company”, your business probably runs on software that someone is building for you.

So ask yourself a hard question. Do you know how your developers, suppliers, or software partners protect their pipelines?

Do they pin GitHub Actions to immutable SHAs, or do they point at mutable version tags because it is easier?

Do they lock down automation tokens properly, or do service accounts have broad standing access because nobody got round to sorting it?

Do they rotate secrets quickly, or do they leave old keys hanging around like spare house keys under a flowerpot?

Do they know what ran on 19 and 20 March, or are they going to spend the next week “investigating” while attackers test stolen credentials?

This is where the story stops being technical theatre and becomes a business risk discussion.

A supply chain attack on a security scanner is not just a developer inconvenience. It is a trust collapse. If an attacker can sit in your build process and quietly lift secrets, they can do much more than watch. They can pivot. They can come back later. They can use those credentials against cloud infrastructure, repos, registries, clusters, and downstream customer environments. They can turn your internal problem into your customer’s next headline.

That is why this story matters in the UK right now. We have too many businesses still treating supply chain security as something only giant enterprises need to worry about. That view is nonsense. Small and mid sized firms are perfect stepping stones. You are easier to compromise, less likely to have strong detection, and often trusted by somebody bigger. That is the attacker’s dream.

If you use GitHub Actions, the lesson here is painfully simple. Mutable tags are not trust. They are convenience wrapped in optimism. Aqua’s guidance now explicitly pushes teams to pin actions to full commit SHAs, not version tags. Why? Because tags can move. That was the whole trick.

It is the same old cyber story wearing new clothes. Convenience wins. Security loses. Then everyone acts shocked.

There is another lesson here as well, and it is one that plenty of UK boards still do not grasp. Tool sprawl is not maturity. Buying more scanners, more platforms, and more dashboards does not make you secure if your trust model is weak. It just gives you more logos to put in a slide deck while your release pipeline leaks like a colander.

So what should UK organisations do right now?

First, find out whether you used Trivy v0.69.4, trivy-action, or setup-trivy in the affected period. If you did, stop assuming you got lucky.

Second, remove the compromised versions and move to safe versions. Aqua says safe references include Trivy v0.69.2 to v0.69.3, trivy-action v0.35.0, and setup-trivy v0.2.6.

Third, rotate every secret those runner environments could access. Not the ones you think were exposed. All of them that were accessible. That means cloud credentials, GitHub tokens, service principals, registry secrets, SSH material, the lot.

Fourth, review logs for unusual access from CI environments. Check cloud control planes, code hosting, registry pulls, identity platforms, and outbound connections. CrowdStrike noted that the malicious payload ran before the real scanning logic. That means a successful build tells you precisely nothing.

Fifth, fix the underlying design problem. Pin actions to immutable SHAs. Reduce token permissions. Use short lived credentials. Separate environments properly. Audit automation accounts. Stop handing broad standing access to bots just because it keeps the pipeline “simple”.

Simple for who?

Simple for the attacker, perhaps.

There is a wider governance issue too. Supply chain security still gets shoved into the technical basement, like a developer problem or a DevOps housekeeping task. That is too small a lens. This is operational resilience. This is third party risk. This is board level risk appetite in action. If your business depends on software delivery and cloud automation, then your build pipeline is part of your critical infrastructure. Treat it that way.

And if you outsource development, you need to ask awkward questions right now.

Do your suppliers pin dependencies and actions properly?

How do they protect release credentials?

How fast can they rotate secrets after a compromise?

What evidence can they provide that your environment, data, or integration points were not exposed?

What logging do they have for build systems?

If the answer comes back wrapped in waffle, buzzwords, and “we are looking into it”, you have found your problem.

This is also a nice moment to say something many people in tech hate hearing. Open source is brilliant. It is also a trust economy. That means you cannot consume it like a child at a pick and mix and then act surprised when no one verified what went into the bag. If you rely on open source tools in production workflows, and most of us do, then you need controls around provenance, integrity, and exposure. Hope is not a control.

The Trivy incident does not mean Trivy is uniquely bad. It means modern pipelines are dangerously trusting, and attackers know exactly where that trust lives. They are not always battering at the perimeter now. Sometimes they just wait inside the process you built to keep yourself safe.

How very 2026.

For UK SMBs, the practical takeaway is this. You do not need a Silicon Valley engineering budget to learn the lesson here. You need discipline. Pin what you run. Limit what it can access. Rotate what it exposes. Monitor what it does. Challenge your suppliers. Review your automation. And stop confusing “it worked” with “it was safe”.

Because if your build pipeline quietly hands over the keys while the scan still comes back green, what exactly are you trusting?

What UK businesses should do today

1. Check exposure fast

Review whether you used Trivy v0.69.4, trivy-action, or setup-trivy in the affected windows on 19 and 20 March 2026.

2. Rotate secrets hard

Treat every secret available to those runner environments as exposed. Rotate first. Debate later.

3. Pin actions properly

Move from mutable version tags to full commit SHAs for GitHub Actions.

4. Reduce automation privileges

Cut down token scope, remove standing access, and move toward short lived credentials wherever you can.

5. Ask suppliers awkward questions

If software is built for you, ask for evidence, not reassurance.

Final thought

The grim beauty of this attack is that it did not need to break the scanner in a noisy way. It just needed to let your organisation keep trusting it for a few more hours.

That is modern cyber risk in one sentence.

The thing that looks fine is often the thing robbing you.

Sources

SourceLink
Aqua Security update on ongoing investigation and remediationhttps://www.aquasec.com/blog/trivy-supply-chain-attack-what-you-need-to-know/
CrowdStrike analysis of the trivy action supply chain compromisehttps://www.crowdstrike.com/en-us/blog/from-scanner-to-stealer-inside-the-trivy-action-supply-chain-compromise/
Wiz summary of the Trivy compromisehttps://www.wiz.io/blog/trivy-compromised-teampcp-supply-chain-attack

Filed under

  • Cyber Security
  • Supply Chain Security
  • DevSecOps
  • GitHub Actions
  • UK SMB