Cremit
/incidentsfield log
CatchesCampaignsExfilPatternsLLMIncidentsMethodology
↺rss↗cremit.io

incidents.cremit.io

A reference feed of real-world Non-Human Identity (NHI) credential leak incidents. Maintained by Cremit.

Browse

  • All incidents
  • npm supply chain
  • CI/CD compromise
  • Methodology

Subscribe

  • RSS feed
  • @cremit_io
  • GitHub
// status
monitor active
// build
2026-05-20
// origin
cremit · seoul, kr
// license
CC BY 4.0

© 2026 Cremit. content reuse encouraged with attribution.

campaigns/shared NHI target

AWS config file

aws-config-file
members
2
combined blast
—
last alerted
—
fire count
0

// members

Every caught package that currently matches this cluster's axis, replayed live over the last 7 days. Snippets show where the cluster identifier appears in the package's static excerpt or which takeover heuristic fired.

  • npm/@antv/gi-theme-antd·@0.6.11·18h ago·iaaron
    dist/dark.js

    llm: No suspicious destination, no remote-exec shape — 1 known-vendor host(s).

  • npm/·@1.0.3·19h ago·
    var reA = /[-+]?(?:\d+\.?\d*|\.?\d+)(?:[eE][-+]?\d+)?/g,

    llm: No suspicious destination, no remote-exec shape — 3 known-vendor host(s), 2 other host(s).

@antv/d3-interpolate
panyuqi
← back to all campaigns