Articles

Articles from the SkySiege team covering Cloud Security, Penetration Testing and Advisories

newsletter

Be the First to Know!

Get notified of our articles as they're available

Your data is safe - no sharing, no spam.

Trivy Compromise - March 2026

Trivy Compromise - March 2026

Trivy Security has suffered a significant compromise affecting at least one customer. Based on evidence from our SOC, the blast radius is likely to expand.

Summary of Events

  • Aqua Security confirmed a supply-chain compromise of Trivy after attackers reused credentials from a prior March breach that was not fully contained.
  • Paul McCarty disclosed that Trivy v0.69.4 was backdoored. Socket and Wiz found the compromise extended to Trivy-related GitHub repositories used in CI/CD, including trivy-action and setup-trivy.
  • Attackers force-pushed 75 of 76 tags in aquasecurity/trivy-action, causing tag-pinned workflows to execute malicious code.
  • The payload exfiltrated credentials from developer machines and CI/CD environments, including AWS, GCP, Azure, Kubernetes, Docker, Git, Terraform, Vault, databases, SSH/TLS keys, .env files, and in-memory secrets from GitHub Actions runners.
  • Data was exfiltrated to scan.aquasecurtiy[.]org, with fallback via a public GitHub repository in the victim account.
  • The malicious release was live for ~3 hours; compromised repository tags persisted for up to 12 hours.
  • Aikido linked the same actor (TeamPCP) to a follow-on npm worm (CanisterWorm) that steals npm tokens and republishes malicious packages at scale.

What we can learn

This incident was not a single failure — it reflects weak supply-chain discipline.

penetration testing cloud automation

Reference: Insider Domain Trading

Reference: Insider Domain Trading

Test A-R53-11 specifically looks for Domains that do not have a transfer lock enabled. A transfer lock is nothing more than an additional step ahead of transferring a domain to ensure a “belt & braces” type confirmation that a domain should definitely be transfered. All a transfer lock requires is that the transfer lock is disabled by an API call or a confirmation in the AWS Web Console ahead of initiating a transfer. However, this simple mechanism provides a few additional features to help protect domains from being stolen, even to insiders.

reference security domains

Reference: When is S3 data public?

Reference: When is S3 data public?

SkySiege tests A-S3-4, A-S3-5, A-S3-6, A-S3-7, A-S3-8 and A-S3-9 all focus on public access blocks and the quality of S3 Bucket Policies. The reasoning for this is simple - Public Access Blocks and Bucket Policies are front line protections for ensuring that your data is not publicly available.

reference security domains

Reference: Cracking Weak DKIM

Reference: Cracking Weak DKIM

Test A-R53-10 reviews DKIM records to determine if the DKIM key is of a suitable size. As the DKIM key is part of a asymetric keypair we can infer certain properties of the corresponding private key, including the key size. Therefore using small key sizes for DKIM signatures publicly advertises that your private key must also be a small size and therefore subsceptible to cracking.

The researchers at Jedi Security successfully cracked a 512-bit DKIM key and were able to forge an email with the cracked key which successfully passed DKIM checks across a number of top email service providers.

reference email domains

Reference: What's in a name?

Reference: What's in a name?

Test A-R53-8 specifically looks for Domains that are due to expire within the next 90 days that do not have any form of auto renewal. We reference the risk for expired domains to get squatted whereby a third party captures the domain and utilises it for ransom, SEO capture or other nefarious schemes. However, there’s an additional level of risk in the data that the domain has implicit ownership over that has been proven by other researchers in the field.

reference security domains