All Intelligence

Supply Chain

Software supply chain compromises, dependency attacks, and ecosystem risks.

26 items

highSupply ChainActive

Vercel breach exposes developer infrastructure at scale: supply-chain risk for thousands of deployed applications

Vercel, a major cloud deployment platform used by thousands of companies, has confirmed a security incident with threat actors claiming to possess stolen data and attempting to sell it. This represents a significant supply-chain risk given Vercel's position in the modern development workflow and the potential scope of compromised customer environments.

Vercel
criticalSupply ChainActive

Marimo notebook vulnerability weaponised for malware distribution via Hugging Face trusted infrastructure

Attackers exploited a flaw in Marimo (a reactive Python notebook framework) to execute arbitrary code and deploy NKAbuse malware variants through Hugging Face Spaces, a platform trusted by ML researchers and developers. This represents a supply-chain attack exploiting both a software vulnerability and the trust model of a widely-used ML hosting platform.

Marimo, Hugging Face Spaces, Python notebook users
highSupply ChainContained

OpenAI's macOS certificate rotation exposes supply chain risk in CI/CD pipelines via compromised npm packages

OpenAI discovered that malicious Axios npm packages executed within a GitHub Actions workflow and compromised macOS code-signing certificates used for application distribution. The incident highlights how CI/CD environments remain attractive targets for attackers seeking to inject malware into signed, trusted applications.

OpenAI, macOS applications signed by OpenAI, organisations using GitHub Actions with npm dependencies
criticalSupply ChainActive

NPM supply-chain attack: 36 Strapi lookalike packages deploy database exploits and persistent implants

Researchers identified 36 malicious npm packages masquerading as Strapi CMS plugins that exploit Redis and PostgreSQL instances, harvest credentials, deploy reverse shells, and install persistent implants. This represents a coordinated supply-chain attack targeting development environments with potential access to production infrastructure.

npm registry, Strapi CMS, Node.js developers +2
mediumSupply ChainContained

Anthropic's Claude Code source leaked via NPM: supply-chain exposure without credential compromise

Anthropic accidentally published Claude Code's closed-source implementation to NPM, exposing proprietary code but not customer data or authentication credentials. The leak represents a supply-chain accident rather than an exploitable vulnerability, though source code disclosure carries competitive and reverse-engineering risks.

Anthropic Claude Code, NPM ecosystem
criticalSupply ChainActive

TeamPCP Exploits PyPI Trust Model with Steganographic Malware Distribution via Compromised Telnyx Package

TeamPCP compromised the legitimate Telnyx package on PyPI and uploaded malicious versions that extract credential-stealing malware from embedded WAV files. This represents a direct attack on Python's package supply chain affecting any developer who installed the backdoored version.

Telnyx Python package on PyPI, Python developers and applications using compromised versions
criticalSupply ChainActive

GlassWorm Supply-Chain Escalation: Transitive Dependency Injection via Open VSX Registry

GlassWorm threat actors are exploiting extensionPack and extensionDependencies features in Open VSX to achieve transitive malware propagation across 72+ extensions, significantly improving attack efficiency and evading detection. This represents a watershed moment in IDE-based supply-chain attacks targeting developer environments.

Open VSX Registry, Visual Studio Code Community, Open VSX Extension Developers +1
criticalSupply ChainActive

Siemens SIDIS Prime Supply Chain Vulnerability Storm - 23 CVEs from Outdated Dependencies

Siemens SIDIS Prime versions before 4.0.800 contain 23 vulnerabilities across OpenSSL, SQLite, and Node.js packages, creating a critical attack surface in industrial control environments that depend on this software.

CVE-2024-29857CVE-2024-30171CVE-2024-30172CVE-2024-41996CVE-2025-6965CVE-2025-7783CVE-2025-9230CVE-2025-9232CVE-2025-9670CVE-2025-12816CVE-2025-15284CVE-2025-58751CVE-2025-58752CVE-2025-58754CVE-2025-62522CVE-2025-64718CVE-2025-64756CVE-2025-66030CVE-2025-66031CVE-2025-66035CVE-2025-66412CVE-2025-69277CVE-2026-22610
Siemens SIDIS Prime <4.0.800