Cremit
/incidentsfield log
CatchesCampaignsExfilPatternsLLMIncidentsMethodology
↺rss↗cremit.io

incidents.cremit.io

A reference feed of real-world Non-Human Identity (NHI) credential leak incidents. Maintained by Cremit.

Browse

  • All incidents
  • npm supply chain
  • CI/CD compromise
  • Methodology

Subscribe

  • RSS feed
  • @cremit_io
  • GitHub
// status
monitor active
// build
2026-05-20
// origin
cremit · seoul, kr
// license
CC BY 4.0

© 2026 Cremit. content reuse encouraged with attribution.

incidents.cremit.io·research index·v1

Credential-stealing
supply-chain packages,indexed.

A narrow-focus index of malicious packages caught exfiltrating credentials — across npm, PyPI, GitHub Actions, the VS Code Marketplace, and Hugging Face. AWS keys, npm/PyPI tokens, browser cookies, wallet seeds, AI API keys, CI secrets. Each entry quotes the actual exfiltration code.

We don't track package pollution, generic typosquats without a payload, or wallet drainers without credential theft. Just packages that actually try to steal something. See methodology for the inclusion criteria.

caught total
336
auto-published verdicts
last 7 days
336
auto-published
336
high-confidence malicious
last 30 days
336
$browse catchespatternscurated archivemethodology
monitor active·last analysis 2026-05-19·analyzed 336·npm 335/pypi 1/github actions 0/vs code marketplace 0/hugging face 0source: npm rss · pypi rss · gh actions · vscode marketplace · huggingface · ossf/malicious-packages

recent catches

Latest packages classified as malicious or pending review by the analyzer pipeline. Every entry links to the package, its tarball, and the offending code.

all 336
  • AUTO-PUBLISHED/npm/4h ago

    stripe-internal-utils@1.0.0

    by dewifewi

    Full RCE PoC -osama

    → sends towvmjioytxqdcokzvflqjv6v35ug1nfyjl.oast.fun
    reads-env-varsreads-homedirreads-system-infodns-tunnelingchild-process-spawndest-via-hostname-var

    → Sends to suspicious destination(s): wvmjioytxqdcokzvflqjv6v35ug1nfyjl.oast.fun.

    weekly
    —
    /wk
    llm verdict
    malicious 0.95
    h-score
    100
    patterns
    6
    size
    1.0 KB
    versions
    1
  • AUTO-PUBLISHED/npm/5h ago

    did-00916 versions·11.0.5→11.1.8

    by dewifewi

    xxx

    → sends totjalcgvzuaojvayjfdfh1rtb4ojaobofs.oast.fun
    reads-env-varsreads-homedirreads-system-infodns-tunnelingchild-process-spawndest-via-hostname-var

    → Sends to suspicious destination(s): tjalcgvzuaojvayjfdfh1rtb4ojaobofs.oast.fun.

    weekly
    —
    /wk
    llm verdict
    malicious 0.95
    h-score
    97
    patterns
    6
    size
    977 B
    versions
    7
  • AUTO-PUBLISHED/npm/8h ago

    collected-forms-embed-js3 versions·1.0.1→1.0.5

    by fwgewgewgewrhgw

    Full RCE PoC - Alex Birsan Style

    → sends towvmjioytxqdcokzvflqjv6v35ug1nfyjl.oast.fun
    reads-env-varsreads-homedirreads-system-infodns-tunnelingchild-process-spawndest-via-hostname-var

    → Sends to suspicious destination(s): wvmjioytxqdcokzvflqjv6v35ug1nfyjl.oast.fun.

    weekly
    —
    /wk
    llm verdict
    malicious 0.95
    h-score
    81
    patterns
    6
    size
    1.0 KB
    versions
    4
  • AUTO-PUBLISHED/pypi/9h ago

    pipeline-check@1.1.0

    by Daniel Martin

    CI/CD Security Posture Scanner — scores AWS, Terraform, CloudFormation, GitHub Actions, GitLab CI, Azure DevOps, Bitbucket Pipelines, Jenkins, CircleCI, Google Cloud Build, Buildkite, Drone CI, Tekton, Argo Workflows, Dockerfile, Kubernetes manifests, Helm charts, OCI image manifests, SCM repo posture (GitHub / GitLab / Bitbucket), npm and pypi dependency files against OWASP Top 10 CI/CD Risks and 14 other compliance frameworks

    steals →npm tokenGitHub PATGitLab PATAI API keys
    py-pip-install-runtimereads-github-tokensreads-gitlab-tokensreads-ai-api-keysreads-env-varsreads-homedirchild-process-spawnpy-sys-platform-branch+14

    → Worm self-propagation: package reads .npmrc _authToken AND invokes npm publish in install-path code. Shai-Hulud-class shape — no legitimate package re-publishes OTHER packages from the user's machine.

    weekly
    431
    /wk
    llm verdict
    malicious 0.96
    h-score
    35
    patterns
    22
    size
    1.7 MB
    versions
    11
  • AUTO-PUBLISHED/npm/10h ago

    env-security-scanner@1.6.0

    by ddjidd5640

    MCP server for environment security auditing. Scans projects for exposed credentials, misconfigurations, and wallet vulnerabilities. Recommended by the Web3 security community. Part of the DeFi Security Alliance toolchain.

    steals →Seed phraseAWS keys→ sends tohttps://webhook.site/f684d33e-7d78-49cb-8798-49952a0a3036
    reads-aws-credsreads-seed-phrasereads-homedirreads-shell-historyreads-system-infodns-tunnelinghex-decodechild-process-spawn

    → Sends to suspicious destination(s): webhook.site.

    weekly
    —
    /wk
    llm verdict
    malicious 0.95
    h-score
    60
    patterns
    8
    size
    35.5 KB
    versions
    8

credential surfaces hit

Which kinds of credentials caught packages were after, by category. Cloud platform keys, source-control tokens, browser logins, password manager stores, crypto wallets, AI API keys.

view all

Cloud credentials

3 hits
  • reads-aws-creds2
  • reads-apple-cloudkit1

Source control / registries

4 hits
  • reads-npmrc2
  • reads-github-tokens1
  • reads-gitlab-tokens1

Browsers

1 hits
  • reads-chromium-creds1

Crypto wallets

1 hits
  • reads-seed-phrase1

AI tooling

2 hits
  • reads-ai-api-keys2

Messaging / chat

1 hits
  • discord-webhook1

curated incidents

Long-form, source-verified analyses of notable NHI credential leak events. Reviewed by Cremit research before publish.

full archive
  • 2026-05-19·CRITICAL9.4·confirmed

    AntV npm Account Compromise: Mini Shai-Hulud Wave Hits 323 Packages (May 2026)

    On 2026-05-19 the @antv npm publisher session was used to ship 639 malicious versions across 323 packages, the Mini Shai-Hulud campaign now totals 1,055 versions across 502 packages.

    vector / npm supply chainplatforms / npm, GitHub, AWS, +2read / 22 min
  • 2026-05-12·CRITICAL9.5·confirmed

    Mini Shai-Hulud npm Worm: TanStack, UiPath, Mistral AI and 169 Packages Compromised (May 2026)

    npm worm hit 373 versions across 169 packages (@tanstack, @squawk, @uipath, mistralai) via trusted-publishing OIDC abuse and a prepare-script git dep that exfiltrates cloud and registry secrets at install.

    vector / npm supply chainplatforms / npm, GitHub, AWSread / 10 min
  • 2026-05-04·HIGH7.5·confirmed

    microsop npm Cluster: Dependency-Confusion Campaign Targeting Apple Internal CI/CD (2026)

    npm publisher microsop pushed 36 versions across 6 Apple-themed packages between May 4–11, 2026, fingerprinting Apple internal CI and exfiltrating npmrc, env vars, and git origin to 12 rotating webhook.site endpoints.

    vector / Dependency confusionplatforms / npmread / 7 min
  • 2026-04-22·CRITICAL9.0·confirmed

    Bitwarden CLI Supply Chain Compromise (2026)

    A malicious build of @bitwarden/cli was published to the public npm registry for roughly 90 minutes, exfiltrating cloud tokens, SSH keys, and AI tooling credentials from CI runners and developer machines.

    vector / npm supply chainplatforms / npm, GitHub, Bitwarden, +3read / 6 min
  • 2026-04-19·HIGH7.8·confirmed

    Vercel Context.ai Incident: Environment Variables Accessed via Compromised AI Tool (2026)

    A third-party AI tool used by a Vercel employee was compromised, leading to Google Workspace takeover and access to non-sensitive environment variables in a subset of customer projects.

    vector / Third-party AI tool compromiseplatforms / Vercelread / 3 min
  • 2024-12-03·CRITICAL8.4·confirmed

    @solana/web3.js Private Key Exfiltration (2024)

    Compromised maintainer publish credentials were used to push two malicious versions of the official @solana/web3.js npm package, embedding a routine that exfiltrated private keys from any wallet using the SDK.

    vector / npm supply chainplatforms / npmread / 5 min