Skip to main content

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [List Home]
Re: [eclipse.org-committers] Guidance following the Trivy security incident

Following up on my earlier message, I have just published a blog post that expands on these recommendations and outlines concrete steps projects can take to reduce the risk of similar supply-chain breaches in the future:

https://mikael.barbero.tech/blog/post/2026-03-24-stop-trusting-mutable-references/ 

If you would like help implementing any of these recommendations, the Eclipse Foundation Security Team is available to support you. You can reach us by email at security@xxxxxxxxxxxxxxxxxxxxxx, or start a discussion in the Eclipse CSI GitHub organization: https://github.com/orgs/eclipse-csi/discussions 

Kind regards,

On behalf of the Eclipse Foundation Security Team,
Mikaël Barbero — Head of Security

On 24 Mar 2026 at 09:15:06, Eclipse Foundation Security Team <security@xxxxxxxxxxxxxxxxxxxxxx> wrote:
Dear Eclipse Foundation Committers,

You may be aware of the recent security compromise involving the open source project Trivy.

The Eclipse Foundation Security Team has thoroughly scanned all projects for signs of compromise and we have contacted the projects identified as potentially exposed. We are working with them, together with the Release Engineering team, to rotate any potentially compromised secrets and strengthen protections against similar incidents in the future.

As part of this effort, we encourage projects to consider using Harden-Runner to improve visibility into CI/CD pipelines and make post-incident analysis easier in the event of a broader compromise.

We also recommend pinning GitHub Actions to immutable references rather than floating tags whenever possible. Tools such as Pinact can help automate this process, while Dependabot can assist in keeping pinned actions up to date. 

We also want to acknowledge the work done by the Aqua Security team to address the issue, document it publicly, and notify users. 

If your project has used any of the compromised resources, please let us know. We are ready to work with you to assess any potential exposure and determine appropriate next steps.

Kind regards,

On behalf of the Eclipse Foundation Security Team,
Mikaël Barbero — Head of Security

Back to the top