npm under siege (what to do about it) (Friends)
Episode
95 min
Read time
2 min
AI-Generated Summary
Key Takeaways
- ✓Attack Scale: Over 1,700 confirmed typosquatting attacks detected in three years, with recent compromises affecting packages receiving 2-3 billion weekly downloads including Prettier, NX, and multiple Sindre Sorhus packages. Attackers stole approximately $500 in cryptocurrency despite massive reach, showing poor execution despite sophisticated access.
- ✓GitHub Actions Vulnerability: Attackers exploited pull_request_target trigger instead of pull_request in workflow files, combined with shell injection bugs, to steal NPM tokens from old branches. This perpetual vulnerability exists because historical GitHub Actions remain executable indefinitely through pull requests against archived branches, requiring manual GitHub support intervention to remove.
- ✓AI-Powered Malware: NX compromise used Claude and Gemini CLI tools with English prompts to scan file systems for sensitive data, triple base64-encoding stolen credentials to evade detection. This novel technique bypasses traditional pattern-matching security tools by using natural language instructions instead of recognizable malicious code patterns.
- ✓PNPM Delay Protection: Configure minimum_release_age setting to reject packages published within seven days, providing time for security vendors to detect malware before installation. This one-line configuration change offers significant protection against noisy attacks typically caught within hours or days, with override options for urgent security patches.
- ✓Socket Firewall Launch: New free tool (sfwpm install) routes package installations through local firewall checking for malware before allowing downloads. Works across NPM, Yarn, PNPM, Cargo, and Python package managers without API keys or rate limits, blocking malicious dependencies in real-time during development workflows.
What It Covers
NPM faces unprecedented supply chain attacks in 2025, with billions of weekly downloads compromised through phishing, GitHub Actions exploits, and AI-powered malware. Socket Security's Feraz explains attack vectors, detection methods, and introduces Socket Firewall for real-time protection.
Key Questions Answered
- •Attack Scale: Over 1,700 confirmed typosquatting attacks detected in three years, with recent compromises affecting packages receiving 2-3 billion weekly downloads including Prettier, NX, and multiple Sindre Sorhus packages. Attackers stole approximately $500 in cryptocurrency despite massive reach, showing poor execution despite sophisticated access.
- •GitHub Actions Vulnerability: Attackers exploited pull_request_target trigger instead of pull_request in workflow files, combined with shell injection bugs, to steal NPM tokens from old branches. This perpetual vulnerability exists because historical GitHub Actions remain executable indefinitely through pull requests against archived branches, requiring manual GitHub support intervention to remove.
- •AI-Powered Malware: NX compromise used Claude and Gemini CLI tools with English prompts to scan file systems for sensitive data, triple base64-encoding stolen credentials to evade detection. This novel technique bypasses traditional pattern-matching security tools by using natural language instructions instead of recognizable malicious code patterns.
- •PNPM Delay Protection: Configure minimum_release_age setting to reject packages published within seven days, providing time for security vendors to detect malware before installation. This one-line configuration change offers significant protection against noisy attacks typically caught within hours or days, with override options for urgent security patches.
- •Socket Firewall Launch: New free tool (sfwpm install) routes package installations through local firewall checking for malware before allowing downloads. Works across NPM, Yarn, PNPM, Cargo, and Python package managers without API keys or rate limits, blocking malicious dependencies in real-time during development workflows.
Notable Moment
An attacker successfully compromised the NX build system by opening a pull request against a two-year-old branch containing a previously fixed GitHub Actions vulnerability. This revealed that security fixes in workflow files cannot truly be patched because historical branches remain exploitable indefinitely through the pull request mechanism.
You just read a 3-minute summary of a 92-minute episode.
Get The Changelog summarized like this every Monday — plus up to 2 more podcasts, free.
Pick Your Podcasts — FreeKeep Reading
More from The Changelog
Exploring with agents (Interview)
Apr 24 · 96 min
The Mel Robbins Podcast
Do THIS Every Day to Rewire Your Brain From Stress and Anxiety
Apr 27
More from The Changelog
Astral has been acquired by OpenAI (News)
Mar 27 · 10 min
The Model Health Show
The Menopause Gut: Why Metabolism Changes & How to Reclaim Your Body - With Cynthia Thurlow
Apr 27
More from The Changelog
We summarize every new episode. Want them in your inbox?
Similar Episodes
Related episodes from other podcasts
The Mel Robbins Podcast
Apr 27
Do THIS Every Day to Rewire Your Brain From Stress and Anxiety
The Model Health Show
Apr 27
The Menopause Gut: Why Metabolism Changes & How to Reclaim Your Body - With Cynthia Thurlow
The Rest is History
Apr 26
664. Britain in the 70s: Scandal in Downing Street (Part 3)
The Learning Leader Show
Apr 26
685: David Epstein - The Freedom Trap, Narrative Values, General Magic, The Nobel Prize Winner Who Simplified Everything, Wearing the Same Thing Everyday, and Why Constraints Are the Secret to Your Best Work
The AI Breakdown
Apr 26
Where the Economy Thrives After AI
This podcast is featured in Best Cybersecurity Podcasts (2026) — ranked and reviewed with AI summaries.
You're clearly into The Changelog.
Every Monday, we deliver AI summaries of the latest episodes from The Changelog and 192+ other podcasts. Free for up to 3 shows.
Start My Monday DigestNo credit card · Unsubscribe anytime