Skip to content

Postmortem: TanStack NPM supply-chain compromise

8.9 relevance
Score Breakdown
technical depth
9
novelty
9
actionability
8
community
10
strategic
9
personal
9

Scored daily by a customisable AI persona to surface the most relevant engineering leadership news.

TanStack supply-chain compromise is a critical security postmortem with high community engagement.

2026-05-12 ai/ml Hacker News (100+)
Postmortem: TanStack NPM supply-chain compromise
Summary

An attacker chained three GitHub Actions vulnerabilities—pull_request_target (Pwn Request), cache poisoning across fork/base trust boundary, and OIDC token memory extraction—to publish 84 malicious versions across 42 @tanstack/* npm packages. No npm tokens were stolen; the payload executed via optionalDependencies and prepare lifecycle scripts during install. Detected externally by StepSecurity's ashishkurmi within 20 minutes, all affected versions deprecated; install hosts from 2026-05-11 require rotating AWS, GCP, Kubernetes, Vault, GitHub, npm, and SSH credentials.

Key Takeaway

Audit your GitHub Actions workflows for pull_request_target usage, implement cache isolation between forks and base, and restrict OIDC token permissions to prevent similar chained attacks.

Why it matters

For senior engineers managing open-source or CI/CD pipelines, this demonstrates how known GitHub Actions design flaws can be combined to compromise the entire supply chain, emphasizing the need for explicit trust-boundary mitigations.