SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals


Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact Us

On March 19, 2026, thousands of CI/CD pipelines ran routine vulnerability scans using Trivy—one of the most trusted open-source security scanners in the cloud-native ecosystem. What those pipelines actually executed, however, was a credential stealer. The security tool designed to protect them had been turned against them.
The threat actor group TeamPCP had quietly compromised Aqua Security’s service account weeks earlier. They then used it to force-push malicious code to 76 of 77 trivy-action version tags. Within hours, the attack cascaded across four additional ecosystems: npm packages, Docker Hub images, Checkmarx GitHub Actions, and—as of this morning—the LiteLLM Python package on PyPI. The campaign is tracked as CVE-2026-33634 (CVSS 9.4).
This is not a theoretical supply chain risk. This is what it looks like when it happens at scale.
We have seen supply chain attacks before—SolarWinds, Codecov, and the tj-actions incident last year. TeamPCP’s campaign stands apart for three reasons:
The speed of propagation is what keeps us up at night:
Each hop was enabled by credentials harvested in the previous phase. One stolen token became five compromised ecosystems.
The final phase of this campaign deserves special attention. LiteLLM is an open-source LLM proxy and gateway with over 40,000 GitHub stars and approximately 95 million monthly downloads on PyPI. Organizations use it to route requests to over 100 LLM providers—including OpenAI, Anthropic, Azure OpenAI, Google Vertex AI, AWS Bedrock, and more—through a single unified interface. It manages API keys, tracks usage costs, and load-balances across models. Wiz Research found LiteLLM is present in 36% of the cloud environments they monitor.
Here is why that matters: a typical LiteLLM deployment stores API keys for every LLM provider an organization uses. Compromising LiteLLM does not just give the attacker cloud credentials—it gives them the keys to an organization’s AI infrastructure. Every model, every provider, and every API key in one place.
TeamPCP compromised LiteLLM because BerriAI’s CI/CD pipeline used Trivy for security scanning. When the poisoned trivy-action executed within that pipeline, it harvested the PyPI publishing token. The attackers then published malicious versions 1.82.7 and 1.82.8 directly to PyPI, bypassing the normal release process.
The malware used a Python .pth file—a mechanism that auto-executes on any Python interpreter startup without requiring an import. As a restul, every python, pip, or pytest command would trigger the credential stealer. PyPI quarantined the malicious packages within approximately three hours, but with 3.6 million daily downloads, the exposure window was significant.
As of March 25, reporting indicates that TeamPCP has pivoted from credential theft to active extortion. the group is reportedly working through approximately 300 GB of compressed stolen credentials and collaborating with the LAPSUS$ extortion group to target multi-billion-dollar companies. Mandiant estimates over 1,000 SaaS environments have been impacted, with the number expected to grow to 5,000-10,000.
Dan Lorenc, CEO of Chainguard, catalogued six fundamental design failures in GitHub Actions that enabled this campaign—from mutable tags without transparency logs to the dangerous pull_request_target trigger that granted initial access. His assessment: “The design of Actions is plain irresponsible today and ignores a decade of supply chain security work from other ecosystems.”
The uncomfortable truth is that the mitigations we recommend—pin to commit SHAs, restrict allowed actions, and monitor CI/CD egress—are workarounds for architectural decisions that should never have shipped as defaults. Chainguard’s research on “imposter commits” further demonstrates that even organization-level action allowlists can be bypassed using commits from forked repositories.
Our report includes a prioritized “Lessons Learned” section with 11 specific steps organized by urgency. The top three for immediate action:
We have published a detailed threat intelligence report covering the complete attack timeline, MITRE ATT&CK® mapping, indicators of compromise, technical payload analysis, and defensive recommendations. It is designed to be immediately actionable for cloud security teams and useful as reference material for incident response.
Given the severity and ongoing nature of this campaign, we are hosting a SANS Emergency Webcast: “When the Security Scanner Became the Weapon.” Eric Johnson and I will walk through the complete attack chain—from the initial pull_request_target exploitation to the cascading compromise of five ecosystems—demonstrate detection techniques, and take your questions live.
If you manage CI/CD pipelines, deploy security scanners, or use LiteLLM within your AI infrastructure, this content is directly relevant to your environment.
Watch the replay by registering for the “When the Security Scanner Became the Weapon” webcast.
SANS Cloud Security courses, including SEC540: Cloud Native Security and DevSecOps Automation and SEC510: Cloud Security Engineering and Controls, teach the practical skills needed to secure CI/CD pipelines, manage identity, and prevent the kind of cascading compromise seen in this attack.
Kenneth G. Hartman is a SANS Certified Instructor and founder of Lucid Truth Technologies. Eric M. Johnson is a SANS Fellow.


Ken owns Lucid Truth Technologies, a private investigation agency and forensic consulting firm specializing in computer, mobile, network, and cloud forensics. Ken’s mission is to “make the truth clear,” and that's reflected in his teaching style.
Read more about Kenneth G. Hartman

Eric is a co-founder and principal security engineer at Puma Security, focusing on cloud security, Kubernetes, and DevSecOps automation. A SANS Fellow, he is co-author and instructor for three SANS Cloud Security courses.
Read more about Eric Johnson