Qlty Software Outage History

Qlty Software is up right now

There were 8 Qlty Software outages since February 17, 2026. Each is summarised below — incident details, duration, and resolution information.

Source: https://status.qlty.sh

Minor April 27, 2026

Degraded Code Coverage Processing (GitHub Upstream Incident)

Detected by Pingoru
Apr 27, 2026, 10:36 PM UTC
Resolved
Apr 27, 2026, 10:36 PM UTC
Duration
Affected: Code Coverage
Timeline · 2 updates
  1. identified Apr 27, 2026, 05:51 PM UTC

    Status: Identified We are currently investigating delays in Code Coverage processing. Coverage uploads that require mapping commits to pull requests may be delayed due to degraded performance in GitHub’s Pull Requests and Search APIs. This can impact the timely delivery of coverage statuses and comments on pull requests. Analysis processing is not affected. The issue is limited to coverage ingestion and reporting. We are actively monitoring the situation and will provide updates as GitHub recovers. For more information, see GitHub’s status page: https://www.githubstatus.com/: https://www.githubstatus.com/?utm_source=chatgpt.com Affected components Code Coverage (Degraded performance)

  2. resolved Apr 27, 2026, 10:36 PM UTC

    Status: Resolved This incident has been resolved. Affected components Code Coverage (Operational)

Read the full incident report →

Minor April 22, 2026

Security Status Report: Trivy v0.69.4

Detected by Pingoru
Apr 22, 2026, 02:46 PM UTC
Resolved
Apr 22, 2026, 02:46 PM UTC
Duration
Timeline · 2 updates
  1. monitoring Mar 20, 2026, 04:59 PM UTC

    Status: Monitoring Security Status Report: Trivy v0.69.4 Compromise Severity: Critical (upstream supply chain compromise) Status: Monitoring What Happened On March 19, 2026, a threat actor used a previously stolen service account credential to push a backdoored release of Trivy: https://github.com/aquasecurity/trivy (v0.69.4). The poisoned release distributed malicious binaries through GitHub Releases, Homebrew, AWS ECR, and rewrote 75 of 76 version tags on the trivy-action GitHub Action. The malware payload functions as an infostealer — targeting CI runner memory, SSH keys, and cloud credentials (AWS, GCP, Azure, and Kubernetes service account tokens). This is the second significant Trivy supply chain compromise in less than a month, and represents a meaningful escalation in both sophistication and reach from the first. Full technical details have been published by Boost Security Labs. The poisoned release (v0.69.4) has since been removed. The known-safe version is v0.69.3. Impact on Qlty Customers Qlty supports Trivy as an optional plugin. We have assessed our exposure across two customer segments: Qlty Cloud Customers — Not Impacted We queried all recorded Trivy plugin invocations across Qlty Cloud and found zero executions of v0.69.4. Qlty Cloud customers were not impacted by this compromise. CLI-Only Customers — Likely Not Impacted Qlty does not automatically pull new plugin releases. Customers who have enabled the Trivy plugin without customizing its version are running v0.69.2 — which predates the compromised release and is unaffected. However, Qlty's plugin system allows version overrides in your .qlty/qlty.toml file. If you manually specified v0.69.4 as your Trivy version, Qlty would have downloaded and executed the compromised binary. If you are a CLI-only user and are unsure whether you overrode this version, please check your .qlty/qlty.toml now. What We're Doing This is the second critical Trivy supply chain compromise in under a month. After the first incident, we removed Trivy from Qlty's recommended plugins during onboarding. Given this repeated pattern, and given that a supply chain compromise of this nature can be the leading edge of a broader attack campaign, we believe the responsible path forward is to recommend disabling the plugin. As with any static analysis tool, users are ultimately responsible for choosing which tools to run in their environment — Qlty operates under a shared responsibility model, and we want to give you the information you need to make that call. Recommended Action To disable the Trivy plugin, remove the Trivy entry from the [plugin] section of your .qlty/qlty.toml file: # Remove or comment out the following block: [[plugin]] name = "trivy" We will communicate when we are confident it is safe to re-enable Trivy. Questions If you have questions about your specific environment or believe you may have been impacted, please reach out to us at [email protected]: mailto:[email protected].

  2. resolved Apr 22, 2026, 02:46 PM UTC

    Status: Resolved This incident has been resolved.

Read the full incident report →

Minor April 21, 2026

Delayed Commit Statuses

Detected by Pingoru
Apr 21, 2026, 09:35 PM UTC
Resolved
Apr 21, 2026, 09:35 PM UTC
Duration
Affected: Code CoverageCode Analysis
Timeline · 3 updates
  1. investigating Apr 21, 2026, 09:19 PM UTC

    Status: Investigating Commit statuses on PRs are currently delayed. We are actively investigating and will update this page when resolved. Affected components Code Analysis (Partial outage) Code Coverage (Partial outage)

  2. monitoring Apr 21, 2026, 09:34 PM UTC

    Status: Monitoring We've scaled up additional capacity and the backlog of analysis results being pushed to GitHub has now cleared. We're continuing to monitor while we investigate the underlying cause of the earlier delays. Affected components Code Analysis (Degraded performance) Code Coverage (Degraded performance)

  3. resolved Apr 21, 2026, 09:35 PM UTC

    Status: Resolved This incident has been resolved. Affected components Code Coverage (Operational) Code Analysis (Operational)

Read the full incident report →

Minor April 15, 2026

Format builds failing

Detected by Pingoru
Apr 15, 2026, 05:19 PM UTC
Resolved
Apr 15, 2026, 05:19 PM UTC
Duration
Affected: Code Analysis
Timeline · 3 updates
  1. identified Apr 02, 2026, 10:22 PM UTC

    Status: Identified A recent update has caused format builds to fail during Qlty Cloud analysis. We've identified the issue and are actively working on a fix. In the meantime, as a workaround, you can format your code locally (using `qlty fmt`) and push your changes as usual. Affected components Code Analysis (Partial outage)

  2. monitoring Apr 03, 2026, 12:34 AM UTC

    Status: Monitoring We have remediated the source of the incident and are monitoring. Affected components Code Analysis (Partial outage)

  3. resolved Apr 15, 2026, 05:19 PM UTC

    Status: Resolved This incident has been resolved. Affected components Code Analysis (Operational)

Read the full incident report →

Minor March 31, 2026

Coverage Queue Backup

Detected by Pingoru
Mar 31, 2026, 10:41 PM UTC
Resolved
Mar 31, 2026, 10:41 PM UTC
Duration
Affected: Code Coverage
Timeline · 3 updates
  1. investigating Mar 30, 2026, 02:05 PM UTC

    Status: Investigating We are investigating a queue backup that is impacting our ability to ingest and report on code coverage. Affected components Code Coverage (Full outage)

  2. monitoring Mar 30, 2026, 02:26 PM UTC

    Status: Monitoring The coverage loader queue backlog has been cleared and processing has been restored. We drained the queue to restore full functionality, so coverage uploads made during the outage window will need to be re-triggered. We are monitoring to confirm stability. A full incident report will follow. Affected components Code Coverage (Operational)

  3. resolved Mar 31, 2026, 10:41 PM UTC

    Status: Resolved This incident has been resolved. Affected components Code Coverage (Operational)

Read the full incident report →

Minor March 3, 2026

Build failures for projects with Trivy enabled

Detected by Pingoru
Mar 03, 2026, 02:52 PM UTC
Resolved
Mar 03, 2026, 02:52 PM UTC
Duration
Affected: Code Analysis
Timeline · 3 updates
  1. identified Mar 02, 2026, 03:31 PM UTC

    Status: Identified Trivy experienced a security incident on 2026-03-01, which resulted in GitHub releases between v0.27.0 and v0.69.1 being deleted, causing build failures for any project using an affected version of the Trivy plugin. Workarounds: • Pin Trivy to v0.69.2 in your .qlty/qlty.toml • Or temporarily disable the Trivy plugin until the situation is resolved For more details on the upstream incident, see the Trivy security incident report: https://github.com/aquasecurity/trivy/discussions/10265. Affected components Code Analysis (Partial outage)

  2. monitoring Mar 02, 2026, 05:16 PM UTC

    Status: Monitoring CLI v0.615.0 has been released with the following fixes: • Trivy is no longer enabled by default when generating a new qlty.toml • Unpinned Trivy usage will now automatically use v0.69.2, the latest available release If you have Trivy pinned to a specific version in your .qlty/qlty.toml, you will need to either update it to 0.69.2 or disable the plugin until the upstream situation is resolved. For more details on the upstream incident, see the Trivy security incident report: https://github.com/aquasecurity/trivy/discussions/10265 Affected components Code Analysis (Partial outage)

  3. resolved Mar 03, 2026, 02:52 PM UTC

    Status: Resolved We've released a fix for this issue. Here's what you need to know: • No action needed if you don't have Trivy pinned to a specific version — Qlty will now automatically use the latest available release today (0.69.2). • If you have Trivy pinned in your qlty.toml, you can remove the pinned version or update it to 0.69.2 to restore builds immediately. • If you'd prefer not to change your config, you can temporarily disable the Trivy plugin to unblock your builds. You can track Trivy's resolution progress here: https://github.com/aquasecurity/trivy/discussions/10265 Affected components Code Analysis (Operational)

Read the full incident report →

Minor February 24, 2026

Timeout commit status being sent for PRs

Detected by Pingoru
Feb 24, 2026, 04:10 PM UTC
Resolved
Feb 24, 2026, 04:10 PM UTC
Duration
Affected: Code Analysis
Timeline · 3 updates
  1. investigating Feb 24, 2026, 01:24 PM UTC

    Status: Investigating We are investigating unexpected behavior. Affected components Code Analysis (Degraded performance)

  2. monitoring Feb 24, 2026, 02:09 PM UTC

    Status: Monitoring We have remediated the source of the incident and are monitoring. Affected components Code Analysis (Degraded performance)

  3. resolved Feb 24, 2026, 04:10 PM UTC

    Status: Resolved This incident has been resolved. Affected components Code Analysis (Operational)

Read the full incident report →

Minor February 18, 2026

Delayed analysis builds

Detected by Pingoru
Feb 18, 2026, 09:04 PM UTC
Resolved
Feb 18, 2026, 09:04 PM UTC
Duration
Affected: Code Analysis
Timeline · 3 updates
  1. investigating Feb 18, 2026, 04:56 PM UTC

    Status: Investigating We are investigating reports of delayed analysis builds. Affected components Code Analysis (Partial outage)

  2. monitoring Feb 18, 2026, 05:44 PM UTC

    Status: Monitoring We have identified an issue causing delays in analysis builds. Our team has implemented a fix, and our systems are currently in the recovery phase. For any pull requests which haven't yet received analysis results, you can manually trigger a new build by pushing a new commit. We are monitoring the backlog to ensure all services return to normal as quickly as possible. Affected components Code Analysis (Partial outage)

  3. resolved Feb 18, 2026, 09:04 PM UTC

    Status: Resolved This incident has been resolved. Affected components Code Analysis (Operational)

Read the full incident report →

Looking to track Qlty Software downtime and outages?

Pingoru polls Qlty Software's status page every 5 minutes and alerts you the moment it reports an issue — before your customers do.

  • Real-time alerts when Qlty Software reports an incident
  • Email, Slack, Discord, Microsoft Teams, and webhook notifications
  • Track Qlty Software alongside 5,000+ providers in one dashboard
  • Component-level filtering
  • Notification groups + maintenance calendar
Start monitoring Qlty Software for free

5 free monitors · No credit card required