How a Typosquatted Domain and a Fake Version Tag Turned Trivy Into a Credential Stealer
9 avril 2026 à 11:44
On March 19, 2026, someone (or some group) poisoned the Aqua Security Trivy ecosystem. A tool that thousands of organizations rely on to find vulnerabilities in their container images and configurations was quietly turned into a weapon that stole their secrets instead. I spent some time pulling apart the malicious code and cross-referencing findings from Wiz’s analysis, and figured the walkthrough was worth sharing. Here’s how it happened (and how a majority of the tech industry ignored the compromise because it was a Friday).
The post How a Typosquatted Domain and a Fake Version Tag Turned Trivy Into a Credential Stealer appeared first on Linux Today.