Aqua Security Trivy GitHub Action Compromised
Aqua Security's Trivy binaries and GitHub actions have been compromised and could harvest secrets
Summary
Aqua Security's Trivy binaries and GitHub actions have been compromised and could harvest secrets
Affected platforms
The following platforms are known to be affected:
- Trivy binary and Container Images
- trivy-action GitHub action
- setup-trivy GitHub action
Please see GHSA-69fq-xp46-6x23 for affected versions.
Threat details
Introduction
Security researchers have identified a supply-chain compromise affecting Aqua Security's Trivy, a widely used vulnerability scanning tool. Compromised versions point to malicious code which could be used as an information stealer to extract secrets and credentials from an affected system.
- CVE-2026-33634 - Embedded Malicious Code vulnerability - CVSSv4 base score: 9.4
Review GHSA-69fq-xp46-6x23 for latest information
The response effort for the compromise of the Trivy project is ongoing and available information may change rapidly. Please review GHSA-69fq-xp46-6x23 for the latest information.
Threat updates
| Date | Update |
|---|---|
| 24 Mar 2026 |
CVE-2026-33634 assigned
The following sections have been updated to reflect new information:
|
| 23 Mar 2026 |
Trivy has released an official advisory for the compromise.
The following sections have been updated to reflect new information:
|
Remediation advice
The NHS England National CSOC recommends impacted organisations review the Trivy advisory GHSA-69fq-xp46-6x23 follow the remediation steps detailed below.
Remediation steps
| Type | Step |
|---|---|
| Patch |
Update to known safe versions: Trivy binary
trivy-action
setup-trivy
Note: New tags have been published with a v prefix (v0.0.1 – v0.34.2) pointing to the original legitimate commits. Old versions without a v prefix should be considered compromised (0.0.1 – 0.34.2). https://github.com/aquasecurity/trivy/security/advisories/GHSA-69fq-xp46-6x23 |
| Guidance |
Reset Secrets: Any pipeline that executed an affected action, binary, or container image should be considered fully compromised and all secrets should be reset. Exposure windows are provided in GHSA-69fq-xp46-6x23. For self-hosted GitHub runners, any additional credentials stored on the device's filesystem should be reset. https://github.com/aquasecurity/trivy/security/advisories/GHSA-69fq-xp46-6x23 |
Definitive source of threat updates
Last edited: 24 March 2026 9:43 am