A highly sophisticated and automated supply chain attack, codenamed Mini Shai-Hulud, is actively compromising open-source software repositories. As of May 12, 2026, the attack has impacted hundreds of versions across more than 170 packages on both npm and PyPI. The threat actor, known as TeamPCP, has demonstrated advanced capabilities by hijacking the legitimate CI/CD release pipelines of high-profile projects, including TanStack, Mistral AI, and UiPath. The malware is a credential-stealing worm that self-propagates through the software ecosystem, posing a severe risk to developers and organizations that consume these packages. The compromise of TanStack's build process, which resulted in malicious packages being signed with valid provenance attestations, marks a significant escalation in supply chain attack techniques.
The Mini Shai-Hulud worm represents the third documented wave of attacks from TeamPCP. This campaign is characterized by its focus on compromising developer accounts and CI/CD environments to inject malicious code into legitimate software packages. The primary goal is widespread credential theft, targeting API keys, cloud service credentials, cryptocurrency wallets, and secrets for AI development tools. A unique and dangerous feature is its worm-like capability: upon compromising a system, it seeks out publishing credentials for other packages and uses them to spread itself further. The attack on TanStack was particularly notable, as the attackers chained multiple weaknesses to steal a short-lived OIDC token from a GitHub Actions runner, allowing them to publish 84 malicious versions that appeared legitimate due to valid SLSA Build Level 3 provenance.
The attackers, TeamPCP, employed a multi-stage attack against the TanStack project. They combined a "Pwn Request" pattern with GitHub Actions cache poisoning to achieve code execution within the CI runner. From there, they were able to extract a sensitive OIDC token from the runner's memory, which was then used to authenticate to the npm registry and publish malicious packages.
MITRE ATT&CK Techniques Identified:
T1199 - Trusted Relationship: The core of the attack relies on compromising the trust relationship between users and the package managers (npm, PyPI).T1059.006 - Python and T1059.007 - JavaScript/JScript: The malicious code is executed when the compromised packages are installed or used.T1552.006 - Stored OIDC Tokens: The attackers specifically targeted and stole a short-lived OIDC token from the GitHub Actions runner process memory.T1078 - Valid Accounts: The worm uses stolen API keys and tokens to authenticate to package registries and publish new malicious versions of other packages, effectively moving laterally through the developer ecosystem.T1555 - Credentials from Password Stores: The payload is a comprehensive credential-stealer targeting a wide range of developer secrets.T1499.001 - OS-level Information Wipe: The malware contains a "dead man's switch" (rm -rf ~/) that attempts to wipe the user's home directory, a destructive and punitive measure.The ability to publish malicious packages with valid SLSA provenance is a game-changer. It demonstrates that even the most advanced integrity and verification checks can be subverted if the build environment itself is compromised. This shifts the focus from verifying the package to securing the entire CI/CD pipeline.
The impact is severe and widespread. Any developer or organization that downloaded and used the compromised versions of the 170+ affected packages is at risk of having their credentials and sensitive data stolen. This can lead to further breaches, financial loss, and compromise of cloud infrastructure. The self-propagating nature of the worm means the attack's scope could expand exponentially. For the affected projects like TanStack, the reputational damage is significant, and they face a major effort to revoke the malicious versions, alert users, and re-secure their build processes. The inclusion of a destructive payload (rm -rf ~/) adds a layer of data loss risk on top of the credential theft.
No specific technical Indicators of Compromise (IOCs) such as IP addresses, domains, or file hashes were mentioned in the source articles.
Security teams may want to hunt for the following patterns to detect potential compromise by Mini Shai-Hulud:
paste.bing, dpaste.com)..npmrc, .git-credentials, or ~/.aws/credentials.npm publish or twine upload processes being executed, especially outside of a normal developer workflow.Dynamic Analysis (D3-DA) of package install scripts in a sandbox to observe behavior before allowing them into a production environment.package-lock.json, yarn.lock, poetry.lock) to pin dependencies to known, vetted versions. This prevents automatic updates to potentially malicious new versions. This is a form of Application Configuration Hardening (D3-ACH).Platform Hardening (D3-PH).User Training (M1017).OpenAI discloses employee device compromise from 'Shai-Hulud' attack; worm's source code leaked, escalating threat.
Use dependency analysis tools that can block the installation of known malicious packages.
Enforce the use of lockfiles to pin dependencies to specific, vetted versions, preventing automatic updates to malicious packages.
Audit CI/CD logs for anomalous publishing activity, such as packages being published outside of a planned release cycle.
Ensure that tokens and credentials used in CI/CD pipelines are short-lived and have the minimum necessary permissions.
The attacker begins publishing malicious versions of TanStack packages.
The attacker finishes publishing 84 malicious versions across 42 TanStack packages.
The supply chain attack is publicly disclosed.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.