Six Vulnerabilities in Major JavaScript Package Managers Expose Projects to Supply-Chain RCE
Read Our Expert Analysis
Create an account or login for free to unlock our expert analysis and key takeaways for this development.
By continuing, you agree to receive marketing communications and our weekly newsletter. You can opt-out at any time.
Recommended for you

GitHub: Invisible Unicode Supply‑Chain Campaign Encodes Malicious JavaScript
Researchers uncovered a cross‑registry campaign that hides executable JavaScript inside seemingly blank strings by using invisible Unicode code points, prompting removals across GitHub, npm, and the VS Code Marketplace. Related investigations link the tactic to publisher‑account abuses, off‑platform Solana memo signaling, and platform convenience features (Codespaces) and package manager gaps that together magnify supply‑chain risk and demand coordinated registry and toolchain fixes.

JavaScript Registry reshapes package delivery and supply‑chain trust for modern JS
A new registry called JSR introduces on‑the‑fly TypeScript handling, stronger provenance tracking, and npm compatibility to simplify publishing and consumption of JavaScript libraries. Early enterprise adoption and integrated security measures position it as a pragmatic catalyst for ecosystem change rather than a direct replacement for npm.
TeamPCP's CanisterWorm: npm Supply-Chain Compromise with Iran-Targeted Wiper
A self‑propagating worm, tracked as CanisterWorm, spread through npm packages and CI/CD pipelines to harvest credentials and push poisoned artifacts; researchers removed malicious packages after tracing a distribution chain tied to earlier tooling compromises. The implant contains an environment‑aware destructive module (Kamikaze) that activates destructive routines under Iran‑specific cues while otherwise focusing on persistence and exfiltration, exposing systemic gaps in artifact provenance, package‑manager logic, and control‑plane credential hygiene.
VS Code extensions left 128 million installs vulnerable to exploitation
A security review uncovered critical and high-severity flaws in four popular Visual Studio Code extensions, collectively reaching about 128 million installs and enabling file theft, remote code runs, and network reconnaissance. Three formal CVEs were published and researchers say multiple maintainers ignored notifications for months, forcing public disclosure and urgent mitigation guidance.
Aqua Security’s Trivy Scanner Hit by Supply‑Chain Compromise
The widely used Trivy vulnerability scanner was altered via stolen credentials, injecting malicious code into CI/CD workflows and exposing pipeline secrets. Immediate secret rotation and tag validation are required; at least 75 action tags and 7 setup tags were modified.

Metro4Shell: Active exploitation of critical React Native Metro bug raises global alarm
Researchers observed in-the-wild exploitation of a critical unauthenticated RCE in the React Native Metro bundler (CVE-2025-11953, CVSS 9.8), with attackers using staged PowerShell loaders and Rust payloads against internet-facing development servers. Given historical patterns where public fixes can speed adversary reconstruction of exploits, defenders should urgently inventory exposed Metro instances, accelerate patching or apply vendor mitigations, and deploy behavior-based telemetry to detect staged loader activity and downstream supply-chain tampering.
Global: OpenClaw plugin marketplace compromised by supply‑chain poisoning of AI skills
Researchers report that hundreds of malicious 'skills' were uploaded to OpenClaw’s ClawHub, delivering backdoors and credential‑theft routines. Separately discovered operational exposures — including internet‑reachable gateways, leaked API tokens and an OpenClaw CVE patched in a maintenance release — magnify the risk of large‑scale compromise across agent deployments.

TeamT5 ThreatSonar vulnerability exploited; CISA adds flaw to KEV list
CISA added a high-severity vulnerability in TeamT5’s ThreatSonar (CVE-2024-7694) to its Known Exploited Vulnerabilities catalogue and required federal remediation by March 10, 2026. The bug allows unsafe file uploads that can be chained with elevated privileges to achieve remote command execution; a vendor patch was issued in August 2024 but evidence of in‑the‑wild exploitation has been reported.