Skip to content

Commit ac2d591

Browse files
fix(security): pin trivy-action to SHA after supply chain attack (#18)
All trivy-action tags before 0.35.0 were force-pushed to malicious commits during March 19-20 2026 (aquasecurity/trivy-action#541). Pin to SHA 57a97c7 (v0.35.0) which was not compromised. Our CI runs on March 19 completed at ~04:58 UTC, before the attack window (~17:43 UTC), so no secrets were exposed. This is a preventive fix. Co-authored-by: Claude Opus 4.6 <noreply@anthropic.com>
1 parent e1cfdbe commit ac2d591

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

.github/workflows/ci.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ jobs:
4646
# Blocking scan: OS packages only. We control the base image and can act on
4747
# these. ignore-unfixed skips CVEs with no Debian patch available yet.
4848
- name: Run trivy OS package scan (blocking)
49-
uses: aquasecurity/trivy-action@0.28.0
49+
uses: aquasecurity/trivy-action@57a97c7e7821a5776cebc9bb87c984fa69cba8f1 # v0.35.0
5050
with:
5151
image-ref: ${{ env.IMAGE_NAME }}:${{ env.IMAGE_TAG }}
5252
severity: CRITICAL,HIGH
@@ -59,7 +59,7 @@ jobs:
5959
# are uploaded to the GitHub Security tab for visibility. Not blocking
6060
# because Go binary CVEs depend on upstream tool releases we don't control.
6161
- name: Run trivy full scan (SARIF, advisory)
62-
uses: aquasecurity/trivy-action@0.28.0
62+
uses: aquasecurity/trivy-action@57a97c7e7821a5776cebc9bb87c984fa69cba8f1 # v0.35.0
6363
if: always()
6464
with:
6565
image-ref: ${{ env.IMAGE_NAME }}:${{ env.IMAGE_TAG }}

0 commit comments

Comments
 (0)