
Mutable tags. 10,000 pipelines. One credential. — What the Trivy attack taught me about implicit trust
A few days ago I was designing a GitHub Actions pipeline with security scanning tools. Choosing what to integrate, how to structure it, what permissions to give it — especially for the context of the project I was building it for. The kind of work that feels productive — you're building something that will improve the team's security posture. That's when I found out what had happened to Trivy. On March 19, 2026, TeamPCP compromised the most widely used open-source vulnerability scanner in the cloud-native ecosystem. They didn't hack a business application. They didn't exploit a vulnerability in production code. They compromised the tool that thousands of organizations use to find vulnerabilities in their own applications. The security scanner became the weapon. That made me stop. Not to throw the pipeline away — but to rethink from what principles I was building it. This post is not a threat intelligence analysis. I'm a practitioner who is learning more and more about building security
Continue reading on Dev.to
Opens in a new tab




