A threat actor compromised the Trivy supply chain, publishing malicious versions of the `trivy` binary/image, `aquasecurity/trivy-action`, and `aquasecurity/setup-trivy` GitHub Actions. Users who downloaded or used these components during the exposure window are at risk of credential theft and other malicious activity. Immediate action is required to update to safe versions and rotate potentially exposed secrets.
This CVE has a CVSS score of 9.5, indicating critical severity due to potential for complete system compromise.
What is Github.com/aquasecurity/trivy?
CVE-2026-33634: Trivy Supply Chain Compromise
Critical severity: complete system compromise is possible.
EPSS score of 20.84% indicates a significant probability of exploitation.
This vulnerability is listed in CISA's Known Exploited Vulnerabilities Catalog.
A threat actor gained unauthorized access to the Trivy release pipeline and published malicious versions of the `trivy` binary and container images, as well as the `aquasecurity/trivy-action` and `aquasecurity/setup-trivy` GitHub Actions. The malicious code injected into these components was designed to steal credentials and other sensitive information from affected systems.
How to fix CVE-2026-33634 in Github.com/aquasecurity/trivy
Patch immediately- 1.Update Trivy to a safe version (v0.69.2, v0.69.3 for binaries; v0.35.0 for trivy-action; v0.2.6 for setup-trivy).
- 2.Rotate all potentially exposed secrets.
- 3.Audit Trivy versions and GitHub Action references in your workflows.
- 4.Search for exfiltration artifacts (e.g., repositories named `tpcp-docs`).
- 5.Pin GitHub Actions to full SHA hashes instead of using mutable tags.
go get -u github.com/aquasecurity/trivy@latestVerify with:
# Download binary and sigstore bundle
curl -sLO "https://github.com/aquasecurity/trivy/releases/download/v0.69.2/trivy_0.69.2_Linux-64bit.tar.gz"
curl -sLO "https://github.com/aquasecurity/trivy/releases/download/v0.69.2/trivy_0.69.2_Linux-64bit.tar.gz.sigstore.json"
# Verify signature
$ cosign verify-blob \
--certificate-identity-regexp 'https://github\.com/aquasecurity/' \
--certificate-oidc-issuer 'https://token.actions.githubusercontent.com' \
--bundle trivy_0.69.2_Linux-64bit.tar.gz.sigstore.json \
trivy_0.69.2_Linux-64bit.tar.gzWorkaround: Pinning to specific, safe commit SHA hashes for GitHub Actions can prevent the use of compromised tags.
NextGuard automatically flags CVE-2026-33634 if github.com/aquasecurity/trivy appears in any of your monitored projects — no manual lookup required.
Stay ahead of go vulnerabilities
Proactively detect and respond to supply chain attacks by using a comprehensive monitoring solution. NextGuard helps you monitor your go dependencies for known vulnerabilities and suspicious activity.
Compare PlansFrequently asked questions
The Trivy supply chain compromise highlights the importance of proactive security measures and dependency monitoring. Stay vigilant and ensure your systems are protected against emerging threats. You can see all go vulnerabilities on our platform.
Related topics