Host Commentary

This week’s episode really came together around one idea: the interface layer is becoming the story.

That’s why the S3 Files launch stood out to me. People are going to flatten it into “S3 is basically EFS now,” and I do not think that is the right read. To me, this feels more like AWS taking a problem people have been awkwardly solving for years with things like s3fs and FUSE mounts, then wrapping it in a managed service boundary with better semantics and less DIY weirdness. Same general problem, very different level of ownership. It is still worth being a little skeptical of how the latency and consistency story holds up under real contention, but the shift itself is meaningful.

The security side of the episode fit that same theme from the uglier direction. The malicious Strapi-themed npm packages are a good reminder that attackers do not always need some brilliant new trick. Sometimes they just need to look normal enough to slide into an existing install habit. Plugins, package names, postinstall hooks, local service access, CI context, that whole surface area is fair game once trust gets handed out too casually.

And Trivy felt worth revisiting specifically because this was not just the exact same story from before. The March 19 incident was Aqua’s own admission that the earlier March 1 compromise had not been fully contained, and that the second round escalated into malicious releases and compromised GitHub Actions paths with real CI/CD secret exposure implications. That makes it less “same story again” and more “the worse sequel that proves the first one was not really over.”

I also liked that the Kubernetes pieces gave the episode some platform depth instead of making it one long supply chain panic spiral. Ingress2Gateway is exactly the kind of migration story infra teams actually live through. Not “look at this shiny new API,” but “how do we move off the thing everyone quietly built around for years without breaking weird controller-specific behavior in production?” And Agent Sandbox is interesting because even Kubernetes is now signaling that newer agent-style workloads may need different lifecycle assumptions, stronger isolation, and a different runtime shape than the old stateless-app model.

So my big takeaway from this week is pretty simple. The helper layer is not really a helper layer anymore. The wrapper around storage, the plugin path, the scanner in CI, the migration tooling, the runtime model for new workloads, that is where a lot of the operational truth lives now. And usually, that is also where a lot of the hidden risk lives.

Extra links / further reading

Amazon S3 Files official announcement

s3fs-fuse GitHub repo

SafeDep’s original write-up on the malicious Strapi npm packages

Original Trivy incident discussion from March 1

Aqua’s continued remediation and timeline update on the Trivy supply chain attack

Gateway API docs

Show Notes

This episode of Ship It Weekly is about the interface layer becoming the story. Brian covers Amazon S3 Files and why it feels more like a managed filesystem layer in front of S3 than “S3 is EFS now,” including how it relates to the old s3fs and FUSE-style approach. He also digs into 36 malicious npm packages posing as Strapi plugins, the uglier follow-on to the Trivy incident he discussed previously, Kubernetes Ingress2Gateway 1.0 and the push toward Gateway API, and Kubernetes Agent Sandbox as a sign that newer AI-style workloads are starting to reshape the platform itself.

Links

Amazon S3 Files

https://aws.amazon.com/blogs/aws/launching-s3-files-making-s3-buckets-accessible-as-file-systems/

Malicious npm packages posing as Strapi plugins

https://thehackernews.com/2026/04/36-malicious-npm-packages-exploited.html

Trivy follow-on incident discussion

https://github.com/aquasecurity/trivy/discussions/10425

RoseSecurity on Trivy / typosquatting angle

https://rosesecurity.dev/2026/03/20/typosquatting-trivy.html

Earlier episode covering the first Trivy incident

Episode 24Mar 6, 2026⏱️ 18:20AWS Bahrain/UAE Data Center Issues Amid Iran Strikes, ArgoCD vs Flux GitOps Failures, GitHub Actions Hackerbot-Claw Attacks (Trivy), RoguePilot Codespaces Prompt Injection, Block “AI Remake” Layoffs, Claude Code SecurityEpisode: AWS Bahrain/UAE Data Center Issues Amid Iran Strikes, ArgoCD vs Flux GitOps Failures, GitHub Actions Hackerbot-Claw Attacks (Trivy), RoguePilot Codespaces Prompt Injection, Block “AI Remake” Layoffs, Claude Code Security

Kubernetes Ingress2Gateway 1.0

https://kubernetes.io/blog/2026/03/20/ingress2gateway-1-0-release/

Kubernetes Agent Sandbox

https://kubernetes.io/blog/2026/03/20/running-agents-on-kubernetes-with-agent-sandbox/

Fortinet FortiClient EMS emergency patch

https://www.fortiguard.com/psirt/FG-IR-26-099

Karpathy post

https://x.com/karpathy/status/2036487306585268612

ProofShot

https://github.com/AmElmo/proofshot

More episodes and show notes

https://shipitweekly.fm

On Call Briefs

https://oncallbrief.com