Back to Feed

A single PR just hijacked the NPM registry...

Video thumbnail: A single PR just hijacked the NPM registry...
May 14, 20266m 16s video lengthFireship
An analysis of a massive open-source supply-chain attack that exploited privileged GitHub Actions workflows to poison npm packages and propagate through the software ecosystem like a worm.

Key Takeaways

  • An exploitable pull_request_target trigger allowed malicious code to poison shared CI caches, later compromising legitimate release pipelines.2:13
  • Stolen npm publishing tokens enabled the attacker to self-propagate by poisoning over 370 versions across 169 packages within hours.3:03
  • The malware embedded persistence into IDE tools and included a destructive dead man switch that wipes system files after token expiry.3:47

Talking Points

  • Trusted publishing failed to act as an absolute defense because the compromise occurred at the workflow context level rather than via token theft.
  • Malicious commits were digitally signed by the Claude Code GitHub app, allowing them to masquerade as legitimate AI-generated contributions.
  • The worm utilized Python SDKs to bridge the gap between the npm ecosystem and PyPI, accelerating its infection rate.3:25
  • Essential pnpm security features like approved-builds blocking serve as a necessary barrier against automated install-script execution.5:03

Analysis

Strategic Significance This incident highlights that supply-chain security is not a solved problem even with 'trusted' cryptograph...

Full analysis available on Pro.

Time saved:5m 22s
Back to Feed