digestweb.dev
Propose a News Source
Curated byFRSOURCE

digestweb.dev

Your essential dose of webdev and AI news, handpicked.

Advertisement

Want to reach web developers daily?

Advertise with us ↗

Back to Daily Feed

TanStack Suffers Sophisticated npm Supply-Chain Attack

Editor's Pick

Originally published on TanStack Blog

View Original Article
Share this article:
TanStack Suffers Sophisticated npm Supply-Chain Attack

Summary & Key Takeaways ​

  • The TanStack team published a postmortem detailing a sophisticated supply-chain attack that affected 42 of their npm packages.
  • The attacker exploited a pull_request_target Pwn Request and GitHub Actions cache poisoning across fork↔base trust boundaries.
  • OIDC tokens were extracted from runner memory, enabling the publication of 84 malicious versions of @tanstack/* packages.
  • The incident highlights critical vulnerabilities in CI/CD pipelines and the npm ecosystem.

Our Commentary ​

This is genuinely unsettling. A supply-chain attack of this sophistication, chaining multiple vulnerabilities, is a stark reminder of the fragility of our software dependencies. The fact that OIDC tokens were extracted from runner memory is particularly alarming; it shows attackers are constantly finding new ways to bypass security measures. We rely so heavily on these open-source packages, and incidents like this erode trust. It's a wake-up call for every project maintaining an npm presence to review their CI/CD security, especially around GitHub Actions and token management. The complexity of the attack vectors makes it clear that defending against these threats requires constant vigilance and deep technical understanding.

Share this article:
RSS Atom JSON Feed
© 2026 digestweb.dev — brought to you by  FRSOURCE