'Mini Shai-Hulud' Supply Chain Worm Compromises TanStack, Mistral AI, and UiPath

New 'Mini Shai-Hulud' Worm Hits npm & PyPI in Major Supply Chain Attack

CRITICAL
May 13, 2026
May 17, 2026
6m read
Supply Chain AttackMalwareVulnerability

Related Entities(initial)

Threat Actors

TeamPCP

Organizations

Products & Tech

npmPyPIOpenSearch

Other

Mini Shai-HuludTanStack Mistral AI UiPath Guardrails AI

CVE Identifiers

CVE-2026-45321
CRITICAL
CVSS:9.6

Full Report(when first published)

Executive Summary

A highly sophisticated and automated supply chain attack, codenamed Mini Shai-Hulud, is actively compromising open-source software repositories. As of May 12, 2026, the attack has impacted hundreds of versions across more than 170 packages on both npm and PyPI. The threat actor, known as TeamPCP, has demonstrated advanced capabilities by hijacking the legitimate CI/CD release pipelines of high-profile projects, including TanStack, Mistral AI, and UiPath. The malware is a credential-stealing worm that self-propagates through the software ecosystem, posing a severe risk to developers and organizations that consume these packages. The compromise of TanStack's build process, which resulted in malicious packages being signed with valid provenance attestations, marks a significant escalation in supply chain attack techniques.

Threat Overview

The Mini Shai-Hulud worm represents the third documented wave of attacks from TeamPCP. This campaign is characterized by its focus on compromising developer accounts and CI/CD environments to inject malicious code into legitimate software packages. The primary goal is widespread credential theft, targeting API keys, cloud service credentials, cryptocurrency wallets, and secrets for AI development tools. A unique and dangerous feature is its worm-like capability: upon compromising a system, it seeks out publishing credentials for other packages and uses them to spread itself further. The attack on TanStack was particularly notable, as the attackers chained multiple weaknesses to steal a short-lived OIDC token from a GitHub Actions runner, allowing them to publish 84 malicious versions that appeared legitimate due to valid SLSA Build Level 3 provenance.

Technical Analysis

The attackers, TeamPCP, employed a multi-stage attack against the TanStack project. They combined a "Pwn Request" pattern with GitHub Actions cache poisoning to achieve code execution within the CI runner. From there, they were able to extract a sensitive OIDC token from the runner's memory, which was then used to authenticate to the npm registry and publish malicious packages.

MITRE ATT&CK Techniques Identified:

  • Initial Access: T1199 - Trusted Relationship: The core of the attack relies on compromising the trust relationship between users and the package managers (npm, PyPI).
  • Execution: T1059.006 - Python and T1059.007 - JavaScript/JScript: The malicious code is executed when the compromised packages are installed or used.
  • Credential Access: T1552.006 - Stored OIDC Tokens: The attackers specifically targeted and stole a short-lived OIDC token from the GitHub Actions runner process memory.
  • Lateral Movement / Propagation: T1078 - Valid Accounts: The worm uses stolen API keys and tokens to authenticate to package registries and publish new malicious versions of other packages, effectively moving laterally through the developer ecosystem.
  • Collection: T1555 - Credentials from Password Stores: The payload is a comprehensive credential-stealer targeting a wide range of developer secrets.
  • Impact: T1499.001 - OS-level Information Wipe: The malware contains a "dead man's switch" (rm -rf ~/) that attempts to wipe the user's home directory, a destructive and punitive measure.

The ability to publish malicious packages with valid SLSA provenance is a game-changer. It demonstrates that even the most advanced integrity and verification checks can be subverted if the build environment itself is compromised. This shifts the focus from verifying the package to securing the entire CI/CD pipeline.

Impact Assessment

The impact is severe and widespread. Any developer or organization that downloaded and used the compromised versions of the 170+ affected packages is at risk of having their credentials and sensitive data stolen. This can lead to further breaches, financial loss, and compromise of cloud infrastructure. The self-propagating nature of the worm means the attack's scope could expand exponentially. For the affected projects like TanStack, the reputational damage is significant, and they face a major effort to revoke the malicious versions, alert users, and re-secure their build processes. The inclusion of a destructive payload (rm -rf ~/) adds a layer of data loss risk on top of the credential theft.

IOCs — Directly from Articles

No specific technical Indicators of Compromise (IOCs) such as IP addresses, domains, or file hashes were mentioned in the source articles.

Cyber Observables — Hunting Hints

Security teams may want to hunt for the following patterns to detect potential compromise by Mini Shai-Hulud:

  • CI/CD Monitoring: Look for build processes that are publishing new package versions with only minor version bumps shortly after a dependency was updated. The worm automates this process.
  • Network Traffic: Monitor for outbound connections from developer workstations and CI/CD runners to known credential exfiltration endpoints or paste sites (e.g., paste.bing, dpaste.com).
  • File System: Search for suspicious scripts in user home directories or temporary folders that perform directory listings for .npmrc, .git-credentials, or ~/.aws/credentials.
  • Process Monitoring: On developer machines, look for unexpected npm publish or twine upload processes being executed, especially outside of a normal developer workflow.

Detection & Response

  • Dependency Scanning: Immediately use dependency analysis tools (e.g., Snyk, Dependabot) to check if any of the compromised package versions are in your projects' dependency trees. Pay close attention to the specific versions listed in security advisories.
  • Credential Rotation: If any compromised package is found, assume all developer secrets on the affected machine or CI runner have been stolen. Immediately rotate all API keys, cloud credentials, and other secrets.
  • Provenance Verification: While this attack subverted it, organizations should still implement SLSA provenance verification. However, this incident shows the need for D3FEND's Dynamic Analysis (D3-DA) of package install scripts in a sandbox to observe behavior before allowing them into a production environment.

Mitigation

  • Pin Dependencies: Use lockfiles (package-lock.json, yarn.lock, poetry.lock) to pin dependencies to known, vetted versions. This prevents automatic updates to potentially malicious new versions. This is a form of Application Configuration Hardening (D3-ACH).
  • Secure CI/CD Environments: Harden CI/CD pipelines. Use short-lived, narrowly-scoped credentials. Isolate build environments from production. Restrict network egress from build runners to only necessary endpoints. This aligns with Platform Hardening (D3-PH).
  • Developer Training: Educate developers on the risks of supply chain attacks and the importance of scrutinizing dependencies. This is part of User Training (M1017).
  • Scope-down Permissions: Ensure that tokens used for publishing packages (like the OIDC token in this attack) have the minimum possible permissions and are as short-lived as possible.

Timeline of Events

1
May 11, 2026
The attacker begins publishing malicious versions of TanStack packages.
2
May 11, 2026
The attacker finishes publishing 84 malicious versions across 42 TanStack packages.
3
May 12, 2026
The supply chain attack is publicly disclosed.
4
May 13, 2026
This article was published

Article Updates

May 17, 2026

OpenAI discloses employee device compromise from 'Shai-Hulud' attack; worm's source code leaked, escalating threat.

MITRE ATT&CK Mitigations

Use dependency analysis tools that can block the installation of known malicious packages.

Enforce the use of lockfiles to pin dependencies to specific, vetted versions, preventing automatic updates to malicious packages.

Audit

M1047enterprise

Audit CI/CD logs for anomalous publishing activity, such as packages being published outside of a planned release cycle.

Ensure that tokens and credentials used in CI/CD pipelines are short-lived and have the minimum necessary permissions.

Timeline of Events

1
May 11, 2026

The attacker begins publishing malicious versions of TanStack packages.

2
May 11, 2026

The attacker finishes publishing 84 malicious versions across 42 TanStack packages.

3
May 12, 2026

The supply chain attack is publicly disclosed.

Sources & References(when first published)

TanStack, Mistral AI, UiPath Hit in Fresh Supply Chain Attack
SecurityWeek (securityweek.com) May 12, 2026
Mini Shai-Hulud Hits TanStack npm Packages
Infosecurity Magazine (infosecurity-magazine.com) May 12, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

npmpypiwormcredential theftCI/CD securitySLSAprovenance

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.