u/kryakrya_it

TanStack npm packages compromised in supply-chain attack targeting developer and CI secrets
▲ 55 r/npm+5 crossposts

TanStack npm packages compromised in supply-chain attack targeting developer and CI secrets

Summary:

A recent npm supply-chain incident affected multiple u/tanstack/* packages. Malicious versions were published to npm, and the payload reportedly executed during install.

The main risk is not only runtime usage. If a developer machine or CI runner installed an affected version, secrets available to the install process may have been exposed.

Reported targets included:

- cloud credentials

- GitHub tokens

- npm tokens

- SSH keys

- CI/deployment secrets

Practical things to check:

- lockfile versions for u/tanstack/*

- npm/pnpm/yarn install logs

- package manager cache

- CI runs during the affected publish window

- GitHub/npm/cloud audit logs

- whether lifecycle scripts were enabled during install

For affected environments, the safer assumption is that exposed credentials should be rotated and dependencies should be reinstalled from a clean lockfile after moving to patched versions.

Primary advisory:

https://github.com/TanStack/router/security/advisories/GHSA-g7cv-rxg3-hmpx

Public tracking issue:

https://github.com/TanStack/router/issues/7383

I also maintain NPMScan and put the affected versions, IOCs, and mitigation notes into one page here:

https://npmscan.com/vulnerability/GHSA-g7cv-rxg3-hmpx

Recent npm vulnerability feed:

https://npmscan.com/latest-vulnerabilities

The bigger question: should Node.js CI pipelines disable install scripts by default, or is that still too impractical for real projects?

npmscan.com
u/kryakrya_it — 1 day ago