Your Vulnerability Scanner Was the Vulnerability: 4 Projects Backdoored in 8 Days
My project: Hermes IDE | GitHub Me: gabrielanhaia Trivy is a vulnerability scanner. Its whole job is finding security problems in other people's code. On March 22, 2026, it became one. Not a metaph...

Source: DEV Community
My project: Hermes IDE | GitHub Me: gabrielanhaia Trivy is a vulnerability scanner. Its whole job is finding security problems in other people's code. On March 22, 2026, it became one. Not a metaphor. Not an exaggeration. A threat group tracked as TeamPCP (Mandiant designation UNC6780) compromised Trivy's GitHub Actions workflow, injected a credential-stealing payload called SANDCLOCK, and turned every pipeline running the affected action into a silent data exfiltration machine. SSH keys, API tokens, cloud credentials. Gone. Through the tool teams installed specifically to stop that from happening. The punchline? Trivy wasn't even the only victim that week. Eight Days, Four Compromises, Two Security Scanners Here's the full timeline. Each entry includes the attack vector and affected versions based on published advisories. March 19 — LiteLLM (PyPI) LiteLLM provides a unified Python interface for calling multiple LLM providers. Thousands of AI projects depend on it. TeamPCP published a