Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Developers Warned of OpenVSX Aqua Trivy Exploit

Developers Warned of OpenVSX Aqua Trivy Exploit

Posted on March 3, 2026 By CWS

Developers are on high alert following a supply chain attack that emerged on March 2, 2026, targeting the Aqua Trivy VS Code extension found in the OpenVSX registry. The attack involved the insertion of unauthorized code into two specific versions, 1.8.12 and 1.8.13, uploaded in late February. These versions introduced malicious natural-language prompts designed to covertly exploit AI coding tools.

Compromised Versions and Their Impact

The Aqua Trivy vulnerability scanner, widely used in both enterprise and individual projects, was compromised in these versions, which included additional code absent from the public GitHub repository. This made the tampering difficult to detect using standard review processes. All versions up to 1.8.11 remained unaffected, aligning perfectly with the public repository.

Security researchers at Socket.dev detected this suspicious activity and linked it to a broader campaign targeting GitHub Actions workflows across major open-source projects. StepSecurity’s analysis revealed that the campaign led to the theft of a personal access token and the takeover of Aqua’s Trivy GitHub repository, enabling the attackers to push the compromised extension to OpenVSX.

Malicious Code and Its Stealthy Execution

Unlike traditional malware, the injected code did not install spyware or backdoors. Instead, it leveraged locally installed AI assistants like Claude, Codex, and GitHub Copilot CLI to conduct deep reconnaissance on the developer’s system. These tools operated in the background without user consent, gathering sensitive data such as credentials and tokens.

The extent of the impact varied with the version installed. Version 1.8.12 included a detailed prompt instructing the AI to scan for sensitive information and send it through various channels. Version 1.8.13 focused on collecting system information and uploading it to a GitHub repository named posture-report-trivy. Both versions were promptly removed on February 28 after the discovery was reported by Socket.dev.

Recommendations for Affected Developers

The malicious code was cleverly concealed within the workspace activation function, ensuring the extension operated normally while executing harmful commands. Techniques like code minification added layers of obfuscation, challenging detection by conventional security tools.

Developers who installed these compromised versions should take immediate action. It is crucial to uninstall the affected extension and verify version history for any traces of these releases. Additionally, developers should inspect their GitHub accounts for the posture-report-trivy repository and review recent activity for unexpected changes. Rotating credentials, including GitHub tokens and API keys, is advised, along with auditing local AI agent logs for unusual behavior.

For further updates and security guidance, follow us on Google News, LinkedIn, and X. Consider setting CSN as a preferred source in Google to stay informed.

Cyber Security News Tags:AI assistants, AI exploitation, AI prompts, Aqua Trivy, coding tools, Cybersecurity, developer security, GitHub actions, GitHub security, malicious code, OpenVSX, Socket.dev, StepSecurity, supply chain attack, vulnerability scanner

Post navigation

Previous Post: DDoS Attacks Surge: Link11’s 2026 Cyber Report Insights
Next Post: Google Reports Exploitation of Qualcomm Android Vulnerability

Related Posts

Check Point Harmony SASE Windows Client Vulnerability Enables Privilege Escalation Check Point Harmony SASE Windows Client Vulnerability Enables Privilege Escalation Cyber Security News
Threat Actors Impersonate as MalwareBytes to Attack Users and Steal Logins Threat Actors Impersonate as MalwareBytes to Attack Users and Steal Logins Cyber Security News
WhisperPair Attack Allows Hijacking of Laptops, Earbuds Without User Consent WhisperPair Attack Allows Hijacking of Laptops, Earbuds Without User Consent Cyber Security News
Critical Android 0-Click Vulnerability in System Component Allows RCE Attacks Critical Android 0-Click Vulnerability in System Component Allows RCE Attacks Cyber Security News
Amazon Uncovers Root Cause of Major AWS Outage That Brokes The Internet Amazon Uncovers Root Cause of Major AWS Outage That Brokes The Internet Cyber Security News
Proxyware Malware Mimic as YouTube Video Download Site Delivers Malicious Javascripts Proxyware Malware Mimic as YouTube Video Download Site Delivers Malicious Javascripts Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Windows 11 Upgrade Issues Disrupt Network Access
  • Coruna Exploit Kit Threatens Thousands of iPhones
  • StegaBin Campaign Exploits npm with Credential Stealer
  • Archipelo and Checkmarx Forge AppSec Alliance
  • Zerobot Malware Targets Tenda Routers and n8n Platforms

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Windows 11 Upgrade Issues Disrupt Network Access
  • Coruna Exploit Kit Threatens Thousands of iPhones
  • StegaBin Campaign Exploits npm with Credential Stealer
  • Archipelo and Checkmarx Forge AppSec Alliance
  • Zerobot Malware Targets Tenda Routers and n8n Platforms

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News