← Supply-Chain Attack Compendium

trivy-hackerbot-claw

Incident Summary

Trivy Repository Takeover via hackerbot-claw

The hackerbot-claw account exploited a pull_request_target workflow in aquasecurity/trivy to run untrusted fork code with repository privileges. The stolen token was used to push directly to the repository, vandalize the README, temporarily privatize and rename the project, replace it with an empty repository, delete release assets from v0.27.0 through v0.69.1, and publish a suspicious Trivy VS Code extension artifact. Aqua restored the repository, revoked publishing tokens, removed the vulnerable workflow, and republished v0.69.2 while rebuilding release assets.

Date
2026-02-28 to 2026-03-01
Category
Open Source
Target Surface
Revision control
Insertion Phase
CI/CD
Impact
Repository Takeover
Cause
CI/CD Exploit

What Was Affected

Package trivy-hackerbot-claw
LanguageGo
ComponentApplication
Artifact typesource archive
Domain typerepository
Domain github.com

Compromised Versions

  • release assets deleted: v0.27.0-v0.69.1
  • restored: v0.69.2

Incident Context

Motive
Credential Theft/Vandalism
Attribution
Individual
Transitive
No
User Impact
0
Observed Duration
1 days

Evidence

Compromised Artifacts

Indicators and Changes

Commits

External References

Source Data

Source record: oss/trivy/meta.yaml