Coding4Food LogoCoding4Food
HomeCategoriesArcadeBookmarks
vi
HomeCategoriesArcadeBookmarks
Coding4Food LogoCoding4Food
HomeCategoriesArcadeBookmarks
Privacy|Terms

© 2026 Coding4Food. Written by devs, for devs.

All news
TechnologyIT Drama

TanStack & Mistral AI Hit Hard: 170+ npm Packages Hijacked in Wild Supply Chain Attack

May 13, 20263 min read

A massive npm supply chain attack hit 170+ packages (including TanStack & Mistral AI) with 400+ malicious versions, without compromising maintainer accounts.

Share this post:
security, cyber, threat, hacker, internet, protection, secure, information, safety, business, cybersecurity, cybersecurity, cybersecurity, cybersecurity, cybersecurity, cybersecurity
Nguồn gốc: https://coding4food.com/post/tanstack-mistral-ai-npm-supply-chain-attack-en. Nội dung thuộc bản quyền Coding4Food. Original source: https://coding4food.com/post/tanstack-mistral-ai-npm-supply-chain-attack-en. Content is property of Coding4Food. This content was scraped without permission from https://coding4food.com/post/tanstack-mistral-ai-npm-supply-chain-attack-enNguồn gốc: https://coding4food.com/post/tanstack-mistral-ai-npm-supply-chain-attack-en. Nội dung thuộc bản quyền Coding4Food. Original source: https://coding4food.com/post/tanstack-mistral-ai-npm-supply-chain-attack-en. Content is property of Coding4Food. This content was scraped without permission from https://coding4food.com/post/tanstack-mistral-ai-npm-supply-chain-attack-en
Nguồn gốc: https://coding4food.com/post/tanstack-mistral-ai-npm-supply-chain-attack-en. Nội dung thuộc bản quyền Coding4Food. Original source: https://coding4food.com/post/tanstack-mistral-ai-npm-supply-chain-attack-en. Content is property of Coding4Food. This content was scraped without permission from https://coding4food.com/post/tanstack-mistral-ai-npm-supply-chain-attack-enNguồn gốc: https://coding4food.com/post/tanstack-mistral-ai-npm-supply-chain-attack-en. Nội dung thuộc bản quyền Coding4Food. Original source: https://coding4food.com/post/tanstack-mistral-ai-npm-supply-chain-attack-en. Content is property of Coding4Food. This content was scraped without permission from https://coding4food.com/post/tanstack-mistral-ai-npm-supply-chain-attack-en
npm supply chain attackmã độc npmtanstackmistral ainpmrcpnpmbảo mật nodejs
Share this post:

Bình luận

Related posts

TanStack's NPM Nightmare: A Supply-Chain Attack and What We Can Learn From It
TechnologyIT Drama

TanStack's NPM Nightmare: A Supply-Chain Attack and What We Can Learn From It

TanStack just got hit by an NPM supply-chain attack. Here's a raw breakdown of what went down, the community fallout, and how to protect your code.

May 123 min read
Read more →

Just another beautiful day in the JS ecosystem: you run npm i and your system gets completely owned. Okay, maybe not that dramatic, but this recent mass supply chain attack hitting npm is a massive wake-up call for us keyboard monkeys who love living on the bleeding edge.

The "WTF Just Happened" Summary

According to a trending Reddit thread over the weekend, the npm registry got hit by a massive, highly coordinated supply chain attack. Here is the quick rundown for you lazy scrollers:

  • Massive Scope: Over 170 packages were targeted, churning out more than 400 malicious versions into the wild.
  • Big Hitters Involved: High-profile names like TanStack (yeah, the React Query folks) and Mistral AI got dragged into this mess.
  • The Absolute Mind-F*ck: Investigations showed that zero maintainer accounts were compromised. Nada. Zip. This implies some dark magic f*ckery—either the attackers found a way to bypass authentication, or they exploited a massive vulnerability in npm's publishing infrastructure.

Reddit Keyboard Warriors & Their Survival Tactics

The comments section turned into a war room, with devs sharing their ultimate survival techniques to avoid explaining to their boss why the company's data is now on the dark web.

The "Let Others Be Guinea Pigs" Faction Many veterans strongly suggest shoving min-release-age=3 (or 7) into your ~/.npmrc file. What does it do? It forces npm to wait until a package version has survived 3-7 days in the wild before downloading it. Let the eager beavers take the bullet first. Interestingly, this isn't just an npm thing. Python devs using uv have an exclude-newer flag, and the Rust Cargo community is heavily debating a similar "dependency cooldown" concept.

The "Enterprise Mirror" Bros Some devs argued: "Why don't big corps use private artifactories delayed by a month?" Counter-argument hit back instantly: Being a month behind means you're missing critical CVE patches for a month, leaving your backend wide open. A delay of a few days paired with active security monitoring is the sweet spot. You don't want to be safe from malware but vulnerable to known exploits.

The "Nuke the Scripts" Gang Another highly upvoted strategy is adding ignore-scripts=true. Malware loves hiding in the lowest-hanging fruits like preinstall or postinstall hooks. Nuke them, and you drastically reduce your risk. Some devs are demanding npm grow up, disable scripts by default, and ban pre-built binaries or minified code outright because they are nearly impossible to audit. Meanwhile, the pnpm chads are just sipping tea in the corner because their package manager already requires an explicit --approve-build flag to run scripts. Based.

The Coding4Food Verdict: Trust Issues

The npm ecosystem has always been the Wild West, and blindly pulling the absolute latest version on Day 1 is a rookie mistake.

Survival guide for the paranoid dev:

  1. Implement dependency cooldowns. If you use Dependabot, tell it to chill the f*ck out for a few days before opening PRs.
  2. Disable scripts. You probably don't need them running automatically anyway.
  3. Audit your lockfiles. Before you spin up a vps for production, take 5 minutes to check your lockfile for any suspicious, randomly named packages.

Stay safe out there, folks. And remember: just because it's on npm doesn't mean it won't steal your crypto keys.

Source: Reddit - Mass npm Supply Chain Attack