Disclosure: I’m the founder of Socket.
(IOW You definitely should still hash-pin actions, but doing so isn’t sufficient in all circumstances.)
https://github.com/aquasecurity/trivy-action/blob/57a97c7e78...
https://github.com/aquasecurity/trivy-action/pull/519
Edit: ah, I see you are referring to the setup-trivy action rather than the trivy-action. Yeah, that looks like a bad default, although to be fair it is a setting that they document quite prominently, and direct usage of the setup-trivy action is a bit atypical as-is.
How do you simultaneously revoke all credentials of all your accounts spanning multiple services/machines/users?
I only clicked on a handful of accounts but several of them have plausibly real looking profiles.
https://github.com/Hancie123/mero_hostel_backend/commit/4bcb...
There are hundreds of automated spam comments there from presumably compromised accounts. The new OP is much more clear regarding what has happened.
"Trivy Supply Chain Attack Spreads, Triggers Self-Spreading CanisterWorm Across 47 npm Packages"
https://it.slashdot.org/story/26/03/22/0039257/trivy-supply-...
Of course, every entity is ultimately accountable for its own security, including assigning a level of trust to any dependencies, so it’s ultimately no excuse, but getting hit by a supply chain attack does evoke a little more sympathy (“at least I did my bit right”), and I feel like the ambiguous wording of the title is trying to access some of that sympathy.