Can you confirm trivy-operator is not affected by the trivy compromise on 2026-03-19 #2933
Replies: 2 comments
-
|
hey @mamccorm - Im not with Aqua, but I started looking into this myself since I run this on my own personal cluster. Going into my own pod running on my cluster I see this: So given the SHA And searching in the main trivy repo discussion tab, I found THIS discussion/answer thread where So my HOPE is that - because this operator & its chart never actually got bumped PAST trivy version That being said, if you manually bumped the image tag to something like a nightly build I don't think my theory holds. Im only a homelab devops engineer though; I do things adjacent to this professionally, and have not been as deep in the trivy/k8s world for too long. I pray that @afdesk , @simar7 or @DmitriyLewen can actually confirm this for me. Last thing I need this week is to find out that this chart ran some previously vulnerable version and I need to rotate literally everything on my cluster to be safe. I'm paranoid enough to not rule out a container escape scenario. At the very least I'm scaling down my deployment of this thing 😞 |
Beta Was this translation helpful? Give feedback.
-
|
hey guys! Last few days, I've checked the repository and couldn't see any strange behavior. Thanks a lot and sorry for inconvinience! |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Trivy-operator pulls in Trivy as a dependency. Was last updated / pinned to v0.69.3:
See: https://www.stepsecurity.io/blog/trivy-compromised-a-second-time---malicious-v0-69-4-release.
Which I believe is prior to the affected version. However can someone confirm that the latest trivy-operator version is not affected for assurance?
Beta Was this translation helpful? Give feedback.
All reactions