Trivy Scan Exposes 3 Critical, 16 High Vulnerabilities in 'megalinter-sungather' Container
A Trivy vulnerability scan has flagged the widely used `ghcr.io/anthony-spruyt/megalinter-sungather:latest` container image as a significant security risk, revealing 47 total vulnerabilities including three rated CRITICAL and 16 rated HIGH. The scan, conducted on March 29, 2026, indicates the container is shipping with outdated and exploitable components, posing a direct threat to any development or CI/CD pipeline that integrates it.
The most severe finding is CVE-2025-68121, a CRITICAL vulnerability in the Go standard library (`stdlib`) version 1.24.3. This is compounded by multiple other HIGH-severity flaws in the same library, alongside vulnerabilities in core dependencies like `github.com/docker/cli`, `zlib`, and `go.opentelemetry.io/otel/sdk`. The scan results provide a clear remediation path, listing fixed versions for each vulnerable package, yet the presence of these unpatched versions in the latest public image suggests the maintainer has not yet applied critical updates.
This exposure creates immediate pressure for organizations using this container for code linting and security scanning. The irony is stark: a tool designed to enforce code quality and security is itself a vector for attack. The findings raise serious questions about software supply chain hygiene and the security posture of popular open-source tooling. Teams relying on this image must urgently assess their risk, apply available patches, or seek alternative, more secure implementations to prevent potential compromise of their build environments.