Executive Summary
The Trivy compromise shows TeamPCP targeting high-trust security tooling and CI/CD paths where defenders often assume integrity rather than validate it continuously.
Technical SEO post for defenders covering compromised Trivy versions, GitHub Actions exposure, TeamPCP infrastructure, and exact hunt queries for CI/CD and endpoint telemetry.
The structured fields below are intended for technical responders, not just general readers.
The Trivy compromise shows TeamPCP targeting high-trust security tooling and CI/CD paths where defenders often assume integrity rather than validate it continuously.
This incident is strategically important because it demonstrates attacker interest in software that already has permission to inspect source, containers, and build infrastructure. The GitHub Actions angle expands the blast radius well beyond direct binary installs.
Trivy installations, GitHub Actions workflows, CI/CD credentials, build telemetry, and any downstream environments that trusted the compromised tooling are exposed.
Active campaign reporting with reusable network and host indicators.
Inventory Trivy versions, review GitHub Actions usage of Trivy-related actions, and hunt for the listed exfiltration infrastructure, archive names, and temporary collection paths.
Agent-authored technical narrative, preserving headings, lists, and code blocks.
The Trivy incident is strategically important because it shows attackers targeting security tooling and CI/CD workflow plumbing, not just application dependencies. A compromised scanner or setup action can inherit visibility into repositories, build logs, tokens, and deployment material by design.
Trivy
trivy@0.69.4
trivy@0.69.5
trivy@0.69.6
GitHub Actions references to review
uses: aquasecurity/trivy-action@<compromised-release-window>
uses: aquasecurity/setup-trivy@<compromised-release-window>
Verified.
Why this matters: Teams that only review workstation package versions may miss workflow-based exposure.
Verified.
scan.aquasecurtiy.org, 45.148.10.212, 94.154.172.43, tdtqy-oyaaa-aaaae-af2dq-cai.raw.icp0.io, and other indicators.tpcp.tar.gz, /tmp/runner_collected_, and libredtail-http as useful pivot points.Why this matters: The hunting surface is wider than version inventory. Network and temporary collection artifacts can reveal systems that no longer retain the vulnerable version.
Verified with high confidence.
Why this matters: Defenders should pivot from Trivy exposure into adjacent campaign indicators instead of scoping only one tool.
/tmp/runner_collected_ and tpcp.tar.gz.This incident matters because Trivy often runs where build credentials and source visibility already exist. The attacker does not need privilege escalation if the compromised tool already operates inside a privileged workflow.
scan.aquasecurtiy.org
45.148.10.212
94.154.172.43
tdtqy-oyaaa-aaaae-af2dq-cai.raw.icp0.io
models.litellm.cloud
plug-tab-protective-relay.trycloudflare.com
audit.checkmarx.cx
tpcp.tar.gz
/tmp/runner_collected_
libredtail-http
The most important triage distinction is between:
Both paths can place attacker-controlled logic into environments that have access to secrets and repository contents.
rg -n "trivy@0.69.4|trivy@0.69.5|trivy@0.69.6|aquasecurity/trivy-action|aquasecurity/setup-trivy" .github/workflows package-lock.json
rg -n "scan.aquasecurtiy.org|45.148.10.212|94.154.172.43|tdtqy-oyaaa-aaaae-af2dq-cai.raw.icp0.io|models.litellm.cloud|plug-tab-protective-relay.trycloudflare.com|audit.checkmarx.cx|tpcp.tar.gz|/tmp/runner_collected_|libredtail-http" /var/log "$WORKSPACE"
Analyst focus:
/tmp/runner_collected_Affected package coordinates and indicators are grouped once for hunting, detections, and review.
uses: aquasecurity/trivy-action, aquasecurity/setup-trivy@March 2026 compromised release window trivy 0.69.4
trivy 0.69.5
trivy 0.69.6 audit.checkmarx.cx
models.litellm.cloud
plug-tab-protective-relay.trycloudflare.com
scan.aquasecurtiy.org
tdtqy-oyaaa-aaaae-af2dq-cai.raw.icp0.io 45.148.10.212
94.154.172.43 /tmp/runner_collected_ tpcp.tar.gz libredtail-http Detection logic is rendered as code so technical users can lift it directly into their own tooling.
rg -n "scan.aquasecurtiy.org|45.148.10.212|94.154.172.43|tdtqy-oyaaa-aaaae-af2dq-cai.raw.icp0.io|models.litellm.cloud|plug-tab-protective-relay.trycloudflare.com|audit.checkmarx.cx|tpcp.tar.gz|/tmp/runner_collected_|libredtail-http" /var/log "$WORKSPACE" rg -n "trivy@0.69.4|trivy@0.69.5|trivy@0.69.6|aquasecurity/trivy-action|aquasecurity/setup-trivy" .github/workflows package-lock.json A concise event chronology helps responders anchor first-seen and disclosure timing.
Microsoft documented the Trivy supply chain compromise and published affected versions plus network indicators.
Later research tied Trivy into the broader TeamPCP campaign timeline spanning additional tooling compromises.
Primary references are kept visible so analysts can trace the underlying reporting quickly.
Independent campaign timeline linking Trivy with subsequent TeamPCP tooling compromises.
Microsoft Security Blog - Trivy supply chain compromise Mar 25, 2026, 12:00 AMPrimary vendor reporting with affected versions, infrastructure, and hunting guidance.