NewsBin 0 discussing
--:--:--
Daily Reset
NewsBin
--:--:--
Until Daily Reset
Mainstream Hacker News 13 hours ago

Postmortem: TanStack NPM supply-chain compromise

A recent supply-chain compromise affected the TanStack NPM packages, exploiting GitHub Actions workflows to execute malicious code and publish compromised versions. The attack leveraged the pull_request_target workflow, which allowed code from forked repositories to run with elevated permissions. The attacker introduced a malicious optional dependency hosted in a forked repository, which was used during the build process, enabling exfiltration of data and unauthorized publishing of tainted packages. The incident was detected quickly thanks to external security researchers who reported the issue within 20 minutes, prompting an immediate coordinated response from the TanStack maintainer team. Despite the rapid detection, the team acknowledged several shortcomings, including the absence of internal alerting mechanisms and the lack of prior auditing of pull_request_target workflows, a known risky pattern. The use of floating references in third-party GitHub Actions and the npm policy preventing unpublishing of packages with dependents further complicated mitigation efforts, allowing malicious packages to remain available for some time. The attackers used forged commit identities and operated through multiple GitHub accounts and forks designed to evade detection. Fortunately, the payload contained errors that caused test failures, which prevented a more stealthy and prolonged attack. This flaw made the malicious activity more conspicuous and allowed for quicker containment. The incident highlighted the risks associated with broad permissions granted in CI/CD pipelines and the challenges in securing open-source supply chains. Going forward, TanStack plans to enhance security by implementing better monitoring of publishing activities, collaborating with security researchers for faster detection, and revising token management strategies to require manual reviews or provenance verification. The event underscores the critical need for rigorous auditing of CI workflows, tighter controls on third-party actions, and improved policies around package publishing to reduce the risk of similar supply-chain attacks in the future.

Original story by Hacker News View original source

0 comments
0 people discussing

Anonymous Discussion

Real voices. Real opinions. No censorship. Resets in 13 hours.

No account needed Anonymous • Resets in 13h

Loading comments...

About NewsBin

Freedom of speech first. Anonymous discussion on today's news. All content resets every 24 hours.

No accounts. No tracking. No censorship. Just honest conversation.