<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>devtake.dev — Wiz</title><description>Articles on devtake.dev covering Wiz.</description><link>https://devtake.dev/</link><language>en-us</language><item><title>Wiz found an RCE in GitHub&apos;s git-push pipeline. The patch shipped in six hours.</title><link>https://devtake.dev/article/github-rce-cve-2026-3854-wiz/</link><guid isPermaLink="true">https://devtake.dev/article/github-rce-cve-2026-3854-wiz/</guid><description>CVE-2026-3854 is a CVSS 8.7 RCE in GitHub&apos;s git-push pipeline. github.com fixed it within hours. 88% of Enterprise Server installs were still vulnerable at disclosure.</description><pubDate>Wed, 29 Apr 2026 09:05:00 GMT</pubDate><category>security</category><category>github</category><category>security</category><category>cve-2026-3854</category><category>rce</category><category>supply-chain</category><category>wiz</category><category>github-actions</category><category>dev-tools</category><author>luca-reinhardt</author></item><item><title>Trivy got hijacked: 75 of 76 version tags rewrote to drop a CI secret-stealer</title><link>https://devtake.dev/article/trivy-supply-chain-attack-compromise/</link><guid isPermaLink="true">https://devtake.dev/article/trivy-supply-chain-attack-compromise/</guid><description>Attackers force-pushed 75 of 76 trivy-action tags to a malicious commit. Pinning by tag turned a trusted scanner into an infostealer for CI pipelines.</description><pubDate>Sat, 18 Apr 2026 08:30:00 GMT</pubDate><category>security</category><category>supply-chain</category><category>trivy</category><category>aqua-security</category><category>github-actions</category><category>cicd</category><category>devsecops</category><category>teampcp</category><author>luca-reinhardt</author></item></channel></rss>