trivy-hackerbot-claw
Trivy Repository Takeover via hackerbot-claw
The hackerbot-claw account exploited a pull_request_target workflow in aquasecurity/trivy to run untrusted fork code with repository privileges. The stolen token was used to push directly to the repository, vandalize the README, temporarily privatize and rename the project, replace it with an empty repository, delete release assets from v0.27.0 through v0.69.1, and publish a suspicious Trivy VS Code extension artifact. Aqua restored the repository, revoked publishing tokens, removed the vulnerable workflow, and republished v0.69.2 while rebuilding release assets.
- Date
- 2026-02-28 to 2026-03-01
- Category
- Open Source
- Target Surface
- Revision control
- Insertion Phase
- CI/CD
- Impact
- Repository Takeover
- Cause
- CI/CD Exploit
What Was Affected
Package
trivy-hackerbot-claw
LanguageGo
ComponentApplication
Artifact typesource archive
Domain typerepository
Domain
github.com
Repository
github.com/aquasecurity/trivy
Compromised Versions
- release assets deleted: v0.27.0-v0.69.1
- restored: v0.69.2
Incident Context
- Motive
- Credential Theft/Vandalism
- Attribution
- Individual
- Transitive
- No
- User Impact
- 0
- Observed Duration
- 1 days
Evidence
Compromised Artifacts
Indicators and Changes
Commits
External References
Source Data
Source record: oss/trivy/meta.yaml