Supply Chain Attack Targets TanStack npm Packages: Broader Implications for Developer Ecosystems
A significant resurgence of the Mini Shai-Hulud campaign has recently emerged, compromising numerous TanStack npm packages and highlighting vulnerabilities in various developer ecosystems. This incident extends its reach to notable packages associated with platforms like UiPath, Mistral AI, OpenSearch, and PyPI, indicating the pervasive nature of the threat.
The Mini Shai-Hulud campaign made its initial waves in April, initially targeting packages linked to SAP. By mid-May, the campaign reached its apex, with attackers successfully hijacking legitimate release pipelines to inject hundreds of malicious versions of packages into the npm registry.
According to a recent in-depth analysis by Socket, a total of 84 npm package artifacts within the TanStack namespace were found to be modified with malware designed to steal credentials, specifically targeting continuous integration systems, including GitHub Actions. This breach has serious implications, notably affecting the popular package @tanstack/react-router, which boasts over 12 million weekly downloads.
Mechanics of the Compromise
The TanStack project outlined the mechanics of the attack, noting that the adversary managed to publish 84 malicious versions across 42 different @tanstack/* packages on May 11, 2026, within a brief timeframe of mere minutes. The attackers utilized advanced techniques to exploit vulnerabilities in the GitHub framework, employing the pull_request_target "Pwn Request" pattern, alongside GitHub Actions cache poisoning and runtime extraction of OpenID Connect (OIDC) tokens from the memory of the runner process.
Crucially, TanStack clarified that no npm tokens had been compromised in the attack, and the npm publish workflow itself remained secure. However, the malicious package versions were found to contain a newly added router_init.js file. Socket described this file as a heavily obfuscated 2.3MB payload that included functionalities such as daemonization, access to GitHub-related environment variables, temporary file staging, and remote dispatch behaviors.
The thorough investigation by Socket also unearthed an optionalDependencies entry that pointed to an orphan commit within the TanStack/router repository. This specific commit introduced a package called @tanstack/setup and a prepare lifecycle hook, which allowed code execution to occur automatically during the installation process.
StepSecurity further emphasized the risks associated with the compromised packages, noting that they carried valid SLSA Build Level 3 provenance attestations because attackers abused the legitimate release pipeline. This leads to a concerning realization: while SLSA provenance confirms which pipeline produced the artifact, it does not guarantee that the pipeline was functioning as intended. Thus, a compromised build step can inadvertently yield validly-attested but malicious packages.
Expanding Horizons: The Campaign’s Reach
Analysis by Wiz has linked the ongoing activity with high confidence to TeamPCP, a group previously associated with compromises affecting platforms such as SAP, Checkmarx, Bitwarden, and others. Their analysis revealed that the malicious payload specifically targets GitHub Actions OIDC, while also attempting to breach several other prominent platforms such as GitLab, CircleCI, AWS, Google Cloud Platform, Azure, Kubernetes, HashiCorp Vault, and package registry tokens.
Wiz’s findings detail the various exfiltration routes utilized by the malware. These include a typosquatted domain, git-tanstack[.]com, a session messenger network, and dead drops within the GitHub API that utilize stolen tokens. Observations also indicated the presence of a gh-token-monitor daemon operating on developer machines, which polled GitHub every 60 seconds. Notably, this daemon was designed to wipe the user’s home directory if a monitored token was revoked; however, it was programmed to exit automatically after a period of 24 hours.
As the campaign broadened its scope, additional compromised artifacts were identified, extending the threat beyond TanStack to include versions of OpenSearch npm packages and PyPI packages such as mistralai 2.4.6 and guardrails-ai 0.10.1, as well as further @squawk packages.
The GitHub Advisory Database has rated the situation concerning the TanStack issue as critical, emphasizing that any developer or continuous integration environment that installed an affected version on May 11, 2026, should be deemed compromised. Consequently, the database has recommended immediate action, advising users to rotate any credentials that were reachable during the installation process and to meticulously review cloud audit logs for any suspicious activity linked to the affected hosts.
This alarming episode underscores the multiple vulnerabilities inherent in the software supply chain. It raises significant questions about the security practices in place within the developer community and reinforces the need for enhanced vigilance and protective measures against such supply chain attacks, which may grow in sophistication and frequency as malicious actors continue to exploit the landscape.

