Guide to Detect, Investigate, and Defend Against Trivy Supply Chain Compromise

Summary: Microsoft publishes a guide to assist organizations in detecting, investigating, and containing the Trivy supply chain compromise following an attack that leveraged prior access to inject malware into official versions of the open-source vulnerability scanner developed by Aqua Security.

The Trivy incident highlights one of the most delicate scenarios in current cybersecurity: when a tool designed for protection is transformed into a vehicle for compromise. Microsoft documents how, on March 19, 2026, the popular open-source vulnerability scanner developed by Aqua Security was ensnared in a sophisticated supply chain attack targeting CI/CD environments.

According to the investigation, attackers took advantage of prior access that had not been fully remediated to introduce credential-stealing malware into official Trivy ecosystem components. The impact went beyond just the main binary: GitHub Actions integrations trivy-action and setup-trivy were also compromised, amplifying the risk for organizations relying on these automated workflows as part of their security and development processes.

The relevance of this incident extends beyond the specific case. This story demonstrates how much confidence in well-known tools can transform into a weakness when the supply chain fails. That is why Microsoft’s guide serves not only as a tactical response but also as a strategic reminder that even the most reliable components must be monitored, verified, and evaluated as part of the attack surface.

Key facts

  • On March 19, 2026, Trivy was compromised in a sophisticated supply chain attack.
  • The actors injected malware into official versions of the Trivy vulnerability scanner tool.
  • The compromise allowed the actors to inject malicious code into GitHub Actions and the official Trivy binary.

Why it matters

This type of threat demonstrates that widely adopted security tools can become attack vectors, necessitating strengthened controls over dependencies, pipelines, and internal environments.