Comment by zx8080
2 days ago
> the compromise originated from the Trivy dependency used in our CI/CD security scanning workflow.
What is the source of compromise?
Does anyone have a list of other compromised projects?
2 days ago
> the compromise originated from the Trivy dependency used in our CI/CD security scanning workflow.
What is the source of compromise?
Does anyone have a list of other compromised projects?
No comments yet
Contribute on Hacker News ↗