When the Scanner Turned: Inside the Trivy Supply Chain Attack and the Rise of CanisterWorm

In March 2026, attackers turned Aqua Security’s Trivy ecosystem into a credential-harvesting distribution channel. This was not one bug, one poisoned package, or one bad release. It was a chained failure across GitHub Actions trust, secret rotation, mutable tags, runner memory, registry publishing, and npm’s default willingness to execute third-party code. On February 27 and February 28, 2026, the Trivy story started the way a lot of modern software compromises start: not with a zero-day in the scanner, but with automation glued together too loosely around trust. An autonomous agent dubbed hackerbot-claw found a dangerous pull_request_target pattern in Aqua Security’s Trivy repository, exploited it, and stole a privileged aqua-bot token. That first breach was bad enough on its own. The real disaster came after the first incident was supposedly contained. ...

March 24, 2026 · 17 min · 3422 words · Pavel Nasovich

Beyond the Prompt: Securing Your LLM's Connection to the World

Large Language Models (LLMs) are revolutionizing how we interact with technology. But their true potential often unlocks when they break free from their digital sandbox and interact with the real world – fetching live data, triggering actions via APIs, or using specialized software tools. Enter the Model-Context Protocol (MCP) and similar frameworks, designed to be the universal adapter, the “USB-C port,” connecting these powerful models to the vast ecosystem of external tools and data sources. ...

April 14, 2025 · 10 min · 1993 words · Pavel Nasovich