# Before: mutable tag reference
- uses: aquasecurity/trivy-action@v0.29.0 # After: pinned to immutable commit SHA
- uses: aquasecurity/trivy-action@a2901b0d1cf3ff4857f5cdf63e42e26d35cfa5e1
# Before: mutable tag reference
- uses: aquasecurity/trivy-action@v0.29.0 # After: pinned to immutable commit SHA
- uses: aquasecurity/trivy-action@a2901b0d1cf3ff4857f5cdf63e42e26d35cfa5e1
# Before: mutable tag reference
- uses: aquasecurity/trivy-action@v0.29.0 # After: pinned to immutable commit SHA
- uses: aquasecurity/trivy-action@a2901b0d1cf3ff4857f5cdf63e42e26d35cfa5e1 - The action executed successfully with plausible scan results
- The malicious binary ran the legitimate Trivy scan and forwarded results
- The payload executed in-memory and self-deleted
- No unexpected files remained in the workspace
- GitHub Actions logs appeared normal - GITHUB_TOKEN (automatic, grants repository access)
- Container registry credentials (Docker Hub, GHCR, ECR, GCR, ACR)
- Cloud provider credentials (AWS, GCP, Azure)
- Kubernetes -weight: 500;">service account tokens
- Any environment-injected secrets - Rotate GITHUB_TOKEN and all Personal Access Tokens
- Rotate container registry credentials
- Rotate cloud provider credentials (AWS, GCP, Azure)
- Audit and rotate Kubernetes -weight: 500;">service accounts
- Check network logs for IOC indicators (connections to 142.11.206.73 or sfrclak.com) - Pin all actions to commit SHA
- Verify scanner binary signatures
- Restrict job permissions to minimum required
- Separate unrelated secrets from security scan jobs
- Enable egress monitoring on CI runners
- Rotate credentials exposed during the compromise window
- Consider local-first pre-commit scanning to reduce CI exposure