🔒 Security & Privacy

76 Poisoned Tags in 12 Days: Pipeline Nightmares from March 2026

Imagine running your trusted vulnerability scanner—only for it to steal your cloud keys. That's what hit four open-source tools in March 2026, all via pipelines.

Timeline graphic of March 2026 supply chain attacks on Trivy, KICS, LiteLLM, and axios

⚡ Key Takeaways

  • Pin dependencies and actions to immutable SHAs, not mutable tags. 𝕏
  • Verify integrity with checksums and signatures before execution. 𝕏
  • Centralized policy enforcement can detect anomalies early—but test it yourself. 𝕏
Published by

Open Source Beat

Community-driven. Code-first.

Worth sharing?

Get the best Open Source stories of the week in your inbox — no noise, no spam.

Originally reported by GitLab Blog

Stay in the loop

The week's most important stories from Open Source Beat, delivered once a week.