I only clicked on a handful of accounts but several of them have plausibly real looking profiles.
https://github.com/Hancie123/mero_hostel_backend/commit/4bcb...
There are hundreds of automated spam comments there from presumably compromised accounts. The new OP is much more clear regarding what has happened.
"Trivy Supply Chain Attack Spreads, Triggers Self-Spreading CanisterWorm Across 47 npm Packages"
https://it.slashdot.org/story/26/03/22/0039257/trivy-supply-...
(IOW You definitely should still hash-pin actions, but doing so isn’t sufficient in all circumstances.)
https://github.com/aquasecurity/trivy-action/blob/57a97c7e78...
https://github.com/aquasecurity/trivy-action/pull/519
Edit: ah, I see you are referring to the setup-trivy action rather than the trivy-action. Yeah, that looks like a bad default, although to be fair it is a setting that they document quite prominently, and direct usage of the setup-trivy action is a bit atypical as-is.
Of course, every entity is ultimately accountable for its own security, including assigning a level of trust to any dependencies, so it’s ultimately no excuse, but getting hit by a supply chain attack does evoke a little more sympathy (“at least I did my bit right”), and I feel like the ambiguous wording of the title is trying to access some of that sympathy.
In my experience that is definitely not true, and I've never heard anyone use it that way. Even though you are correct in who the target was.
How do you simultaneously revoke all credentials of all your accounts spanning multiple services/machines/users?
Disclosure: I’m the founder of Socket.
The Go binary was also compromised, but there's almost no information what the compromised binary did. Did it drop a python script? Did it do direct scanning?
If trivy docker image was used, what's the scope (it does not include python).
https://www.aquasec.com/blog/trivy-supply-chain-attack-what-...