From 0f8c60bc52b063832fb65bb24cffe1ed33c38c1e Mon Sep 17 00:00:00 2001 From: Matthew Mellor Date: Mon, 23 Mar 2026 10:24:14 -0500 Subject: [PATCH] fix(security): pin trivy-action to SHA after supply chain attack All trivy-action tags before 0.35.0 were force-pushed to malicious commits during March 19-20 2026 (aquasecurity/trivy-action#541). Pin to SHA 57a97c7 (v0.35.0) which was not compromised. Our CI runs on March 19 completed at ~04:58 UTC, before the attack window (~17:43 UTC), so no secrets were exposed. This is a preventive fix. Co-Authored-By: Claude Opus 4.6 --- .github/workflows/ci.yml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/.github/workflows/ci.yml b/.github/workflows/ci.yml index d3ce5e7..7f6d830 100644 --- a/.github/workflows/ci.yml +++ b/.github/workflows/ci.yml @@ -46,7 +46,7 @@ jobs: # Blocking scan: OS packages only. We control the base image and can act on # these. ignore-unfixed skips CVEs with no Debian patch available yet. - name: Run trivy OS package scan (blocking) - uses: aquasecurity/trivy-action@0.28.0 + uses: aquasecurity/trivy-action@57a97c7e7821a5776cebc9bb87c984fa69cba8f1 # v0.35.0 with: image-ref: ${{ env.IMAGE_NAME }}:${{ env.IMAGE_TAG }} severity: CRITICAL,HIGH @@ -59,7 +59,7 @@ jobs: # are uploaded to the GitHub Security tab for visibility. Not blocking # because Go binary CVEs depend on upstream tool releases we don't control. - name: Run trivy full scan (SARIF, advisory) - uses: aquasecurity/trivy-action@0.28.0 + uses: aquasecurity/trivy-action@57a97c7e7821a5776cebc9bb87c984fa69cba8f1 # v0.35.0 if: always() with: image-ref: ${{ env.IMAGE_NAME }}:${{ env.IMAGE_TAG }}