Halting Problems

Plain technical notes on sample threat-analysis patterns, written for quick reading and review.

Please donate if you find this helpful!

btc: bc1q3909urygy90qhytu32344ws0t5vy085y0h7xc8
eth: 0x71faaDcAF2538e7346885F772FBAcb88740059A8
xmr: 49PeCUfdgmG1ZMAzUxz2WFWiRDbDrycrJ8qYVfxBq6HWCHjk7uncaoESm7CRF5DtxcFgStuvyvcfUD3p4xU33F8dPep53MP
  1. 1.

    GitHub Action tags for actions-cool/issues-helper and actions-cool/maintain-one-comment were moved to imposter commits that scraped GitHub Actions runner memory and exfiltrated CI/CD secrets.

    #supply-chain#github-actions#ci-cd#credential-theft#tag-hijack
  2. 2.

    The npm package art-template was compromised in versions 4.13.5 and 4.13.6 to inject remote browser-side JavaScript that redirected users into a Coruna-like iOS Safari exploit delivery chain.

    #supply-chain#npm#browser#javascript#exploit-delivery
  3. 3.

    Laravel-Lang packages were compromised through rewritten Composer tags that loaded a PHP backdoor through Composer autoload and exposed developer, CI/CD, cloud, and application secrets.

    #supply-chain#packagist#composer#laravel#credential-theft
  4. 4.

    Megalodon added malicious GitHub Actions workflows to thousands of public repositories to collect environment variables, cloud credentials, source-control secrets, and runner tokens.

    #supply-chain#github-actions#ci-cd#credential-theft#workflow-injection
  5. 5.

    A campaign inserted malicious package.json postinstall hooks into Packagist-linked GitHub repositories, causing npm install workflows to download and execute a GitHub Releases binary as /tmp/.sshd.

    #supply-chain#packagist#github#npm#postinstall
  6. 6.
  7. 7.

    TrapDoor is an active cross-registry supply-chain campaign using npm postinstall hooks, PyPI import-time execution, and Rust build scripts to steal developer, cloud, SSH, and crypto wallet secrets.

    #supply-chain#npm#pypi#crates.io#credential-theft#crypto
  8. 8.

    Mini Shai-Hulud is a highly sophisticated, self-propagating software supply chain worm targeting npm and PyPI ecosystems. Attributed to the TeamPCP threat actor group, it exploits CI/CD pipelines to harvest credentials and forge SLSA Build Level 3 provenance signatures.

    #npm#pypi#supply-chain#worm#teampcp#slsa#credentials-theft
  9. 9.

    On May 19, 2026, the official Microsoft durabletask Python SDK was compromised on PyPI. Threat actors used hijacked publishing credentials to directly upload malicious versions containing a cloud credential-harvesting payload.

    #pypi#package-compromise#supply-chain#credential-theft#microsoft#teampcp
  10. 10.
    Nx Console VS Code Extension Compromise critical 5 sources

    On May 18, 2026, the official Nx Console VS Code extension was compromised when attackers used an OAuth token stolen in the TanStack compromise to publish malicious version v18.95.0, resulting in the theft of 3,800 internal GitHub repositories.

    #vscode#extension#supply-chain#compromise#oauth#teampcp
  11. 11.

    On May 14, 2026, the highly popular Node.js library node-ipc was compromised in a major supply chain attack. Attackers re-registered the expired email domain of a dormant lead maintainer to reset their npm account password and publish credential-stealing updates.

    #package-compromise#maintainer-hijacking#supply-chain#domain-takeover#dns-exfiltration#credential-theft
  12. 12.
    TanStack CI/CD Release Pipeline Poisoning critical 4 sources

    On May 11, 2026, the popular open-source project TanStack fell victim to a CI/CD release pipeline poisoning attack. Threat actors hijacked the release pipeline via a pull request exploitation vector and OIDC token theft to publish 84 backdoored versions across 42 packages.

    #npm#supply-chain#compromise#github-actions#oidc#teampcp
  13. 13.

    On April 30, 2026, `intercom-client@7.0.4` on npm introduced a first-ever `preinstall` hook that executed a Bun-launched obfuscated credential stealer and exfiltrated secrets through GitHub APIs.

    #npm#package-compromise#supply-chain#credential-theft#shai-hulud
  14. 14.
    Lightning PyPI Bun-Based Credential Stealer critical 4 sources

    On April 30, 2026, malicious `lightning` PyPI releases 2.6.2 and 2.6.3 shipped an import-time loader that bootstrapped Bun and executed a large obfuscated JavaScript credential stealer.

    #pypi#package-compromise#supply-chain#credential-theft#shai-hulud
  15. 15.

    A malicious `elementary-data==0.23.3` release was pushed to PyPI and GHCR after attackers exploited a GitHub Actions script-injection path, adding an interpreter-startup `.pth` infostealer.

    #pypi#github-actions#ghcr#supply-chain#credential-theft
  16. 16.
    Axios npm Package Compromise (UNC1069) critical 9 sources

    On March 31, 2026, the popular JavaScript HTTP client Axios was compromised when attackers hijacked a lead maintainer's npm account, publishing malicious versions containing a phantom dependency to drop a cross-platform Remote Access Trojan (RAT).

    #npm#supply-chain#compromise#RAT#waveshaper#unc1069
  17. 17.

    On March 24, 2026, the popular LiteLLM Python package was compromised on PyPI. Attackers harvested PyPI publishing secrets from LiteLLM's CI/CD runner via a previously backdoored dependency, uploading malicious versions containing a python startup hook payload.

    #pypi#package-compromise#supply-chain#credential-theft#teampcp#cascading-trust
  18. 18.

    On March 19, 2026, the widely adopted container vulnerability scanner Trivy was compromised in a major supply chain attack. Cybercrime group TeamPCP poisoned version tags to harvest and exfiltrate runner credentials.

    #ci-cd#github-actions#supply-chain#tag-poisoning#credential-theft
  19. 19.

    Attackers published typosquatted versions of the popular pyspellchecker library to deliver a Remote Access Trojan (RAT) hidden inside compressed Basque dictionary files.

    #pypi#typosquatting#rat#malware