frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Open in hackernews

How the Trivy supply chain attack harvested credentials from secrets managers

https://vaultproof.dev/blog/trivy-supply-chain-attack
13•Rial_Labs•3h ago

Comments

Rial_Labs•3h ago
Author here. Built VaultProof after analyzing the Trivy attack the credential harvesting worked specifically because the keys existed as plaintext in the CI/CD environment after retrieval from the secrets manager. Happy to go deep on the Shamir architecture or the attack mechanics if useful.
dboreham•27m ago
Can you explain what this is please? "Exploits mutable Git tags and self-declared commit identity"
Rial_Labs•11m ago
Two things combined.

First: Git tags are not immutable. When you write actions/trivy-action@v0.69.4 in your pipeline you are not pinning to a fixed commit. The tag is just a pointer and whoever controls the repo can silently move it to point to different code. Most teams assume a version tag means a fixed version. It does not.

Second: Git does not verify who makes a commit. Anyone can set their name to any Aqua Security developer they want. The malicious commit looked like it came from a trusted author because Git has no identity enforcement at all.

The practical fix for the first problem is pinning to a full commit hash instead of a tag name. That hash cannot be moved.

Almost nobody does this by default which is why the attack worked at scale. its very common supply chain failure pattern.

OutOfHere•1m ago
> The practical fix for the first problem is pinning to a full commit hash instead of a tag name

If the underlying project in turn uses named tags, i.e. if the hash pinning doesn't apply transitively, then the protection appears incomplete.

stavros•17m ago
Why use a Shamir architecture at all, instead of giving the CI run an ephemeral token that will be exchanged on the proxy?
wernerb•1h ago
Regarding GitHub actions and it's secret manager. Any decently organized company would do well to stay away from well known secret interfaces. Instead use oidc auth to fetch secrets just in time, all short-lived for the duration of the pipeline.
Rial_Labs•4m ago
OIDC is the right call for cloud provider credentials like AWS, GCP, Azure all support it well and short lived tokens are genuinely better than static keys.

The gap is third party APIs. OpenAI, Stripe, Anthropic, GitHub. None of them support OIDC. You still end up with a static API key that has to exist somewhere in the pipeline as a plaintext string. That is exactly what the Trivy payload targeted.

dboreham•25m ago
Well...obviously secrets available in the runtime environment of a CI job are vulnerable to attacks that can compromise the runtime environment. I think everyone knew that. Also GitHub actions that come from less than unreproachable sources (GitHub themselves, ?) have always been an obvious attack vector. In places I've worked where we were concerned about this we forked all the actions repos into our own org so we could never pick up mystery meat in our jobs.
figmert•5m ago
Leaving aside the fact that this is an ad thinly veiled as an article, OneCli does the same, and recently NanoClaw made OneCli setup their default.

Many African families spend fortunes burying their dead

https://davidoks.blog/p/how-funerals-keep-africa-poor
127•powera•3h ago•97 comments

Microsoft's PhotoDNA technology keeps flagging my face picture

https://www.elevenforum.com/t/microsoft-photodna-scanning-problem-it-is-comical-now.45961/
15•darkzek•38m ago•2 comments

Native Instant Space Switching on macOS

https://arhan.sh/blog/native-instant-space-switching-on-macos/
311•PaulHoule•5h ago•152 comments

How NASA Built Artemis II’s Fault-Tolerant Computer

https://cacm.acm.org/news/how-nasa-built-artemis-iis-fault-tolerant-computer/
71•speckx•10h ago•19 comments

Charcuterie – Visual similarity Unicode explorer

https://charcuterie.elastiq.ch/
123•rickcarlino•5h ago•19 comments

PicoZ80 – Drop-In Z80 Replacement

https://eaw.app/picoz80/
145•rickcarlino•6h ago•21 comments

Reverse engineering Gemini's SynthID detection

https://github.com/aloshdenny/reverse-SynthID
111•_tk_•5h ago•42 comments

Robots Eat Cars

https://telemetry.endeff.com/p/robots-eat-cars
44•JMill•2d ago•31 comments

Will I ever own a zettaflop?

https://geohot.github.io//blog/jekyll/update/2026/01/26/own-a-zettaflop.html
35•surprisetalk•3d ago•17 comments

Unfolder for Mac – A 3D model unfolding tool for creating papercraft

https://www.unfolder.app/
147•codazoda•8h ago•33 comments

Moving from WordPress to Jekyll (and static site generators in general)

https://www.demandsphere.com/blog/rebuilding-demandsphere-with-jekyll-and-claude-code/
40•rgrieselhuber•4h ago•17 comments

Hegel, a universal property-based testing protocol and family of PBT libraries

https://hegel.dev
82•PaulHoule•7h ago•30 comments

Old laptops in a colo as low cost servers

https://colaptop.pages.dev/
151•argentum47•7h ago•82 comments

Research-Driven Agents: When an agent reads before it codes

https://blog.skypilot.co/research-driven-agents/
128•hopechong•8h ago•43 comments

Top laptops to use with FreeBSD

https://freebsdfoundation.github.io/freebsd-laptop-testing/
281•fork-bomber•16h ago•160 comments

BunnyCDN has been silently losing our production files for 15 months

https://old.reddit.com/r/webdev/comments/1sglytg/bunnycdn_has_been_silently_losing_our_production/
111•speckx•3h ago•24 comments

How Close Is Too Close? Applying Fluid Dynamics Research Methods to PC Cooling

https://www.lttlabs.com/articles/2026/04/04/how-close-is-too-close-applying-fundamental-fluid-dyn...
8•LabsLucas•4d ago•2 comments

Generative Art over the Years

https://blog.veitheller.de/Generative_art_over_the_years.html
3•evakhoury•2d ago•0 comments

Reallocating $100/Month Claude Code Spend to Zed and OpenRouter

https://braw.dev/blog/2026-04-06-reallocating-100-month-claude-spend/
293•kisamoto•16h ago•203 comments

How the Trivy supply chain attack harvested credentials from secrets managers

https://vaultproof.dev/blog/trivy-supply-chain-attack
13•Rial_Labs•3h ago•9 comments

Microsoft is employing dark patterns to goad users into paying for storage?

https://lzon.ca/posts/other/microsoft-user-abuse/
216•jpmitchell•4h ago•115 comments

Show HN: I built a Cargo-like build tool for C/C++

https://github.com/randerson112/craft
117•randerson_112•9h ago•108 comments

Introduction to Nintendo DS Programming

https://www.patater.com/files/projects/manual/manual.html
217•medbar•1d ago•50 comments

The Training Example Lie Bracket

https://pbement.com/posts/lie_brackets/
12•pb1729•3h ago•8 comments

Vibe-Coded Ext4 for OpenBSD

https://lwn.net/Articles/1064541/
4•signa11•1h ago•2 comments

Show HN: Druids – Build your own software factory

https://github.com/fulcrumresearch/druids
24•etherio•1d ago•2 comments

EFF is leaving X

https://www.eff.org/deeplinks/2026/04/eff-leaving-x
1107•gregsadetsky•8h ago•927 comments

Instant 1.0, a backend for AI-coded apps

https://www.instantdb.com/essays/architecture
91•stopachka•7h ago•54 comments

A WebGPU implementation of Augmented Vertex Block Descent

https://github.com/jure/webphysics
120•juretriglav•13h ago•15 comments

Wit, unker, Git: The lost medieval pronouns of English intimacy

https://www.bbc.com/future/article/20260408-the-extinct-english-words-for-just-the-two-of-us
184•eigenspace•15h ago•120 comments