Skip to content
Discussion options

You must be logged in to vote

Thanks for flagging this @ovizii — this is a serious supply chain incident and it's a fair question.

TL;DR: Drydock users are not affected by this breach.

We've done a thorough audit and can confirm there is zero exposure across all three attack vectors. No CI runs occurred during the exposure window (March 19–20), and no compromised version was ever pulled or shipped.

1. aquasecurity/trivy-action GitHub Action (primary attack vector)

Not used. Drydock does not use trivy-action or setup-trivy in any GitHub Actions workflow. The attacker force-pushed 76 of 77 release tags to malicious commits — but since we never reference these actions, our CI/CD pipelines were never exposed.

2. Bundled T…

Replies: 1 comment 2 replies

Comment options

You must be logged in to vote
2 replies
@Eesa-000
Comment options

@s-b-e-n-s-o-n
Comment options

Answer selected by ovizii
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
3 participants