`Mini Shai-Hulud` returns: self-propagating npm supply-chain attack hits CI/CD
This worm hijacks CI/CD flows, steals secrets, and spreads through legitimate npm packages. If your pipeline publishes packages or injects tokens broadly, tighten secret scope and rotate exposed credentials now.
StepSecurityfirst detected it in an official@tanstackpackage, which means trusted package names are no longer a safe shortcut.- The blast radius is bigger than a single repo: CI tokens, registry credentials, and publish pipelines can become propagation paths.
- Teams using long-lived secrets in GitHub Actions or package release jobs should assume lateral movement, not isolated package compromise.
- The practical response is boring but urgent: rotate tokens, narrow CI permissions, pin releases carefully, and review package publish automation.