On March 19, 2026, a critical supply chain compromise was identified in the Aqua Security Trivy ecosystem (CVE-2026-33634). Threat actors gained access to release credentials and published malicious versions of the Trivy binary (v0.69.4) designed to exfiltrate CI/CD secrets.
Broadcom has conducted an impact assessment for Tanzu Application Platform (TAP) and Spring Enterprise artefacts to address customer concerns regarding potential exposure in their supply chains.
A third-party supply chain attack where a threat actor (identified as "TeamPCP") successfully published a compromised Trivy binary (v0.69.4) between March 19 and March 22, 2026. This binary aimed to exfiltrate AWS/GCP/Azure keys, Kubernetes tokens, and other pipeline secrets from the runner environment.
Internal audits confirm that Spring Enterprise artefacts pulled from Broadcom repositories are not impacted:
To verify the version of the Trivy scanner running in your TAP cluster, execute the following command:
Review this command before running it.
Note: If the output matches version v0.69.4, immediate action is required.
If a compromised scanner was utilized: