Aqua Security’s Trivy vulnerability scanner was weaponized in a large-scale supply chain attack by criminal group TeamPCP, which exploited the absence of container image digest pinning to substitute a malicious image harvesting secrets and credentials from CI/CD pipelines at build time. Confirmed downstream victims include OpenAI, Checkmarx, and the European Commission. Immediate remediation requires pinning all Trivy image references to verified SHA256 digests, rotating every credential accessible to affected pipelines since March 1, 2026, and auditing pipeline logs for mutable-tag image pulls.