BACK_TO_FEEDAICRIER_2
Bitwarden CLI hit in Checkmarx campaign
OPEN_SOURCE ↗
HN · HACKER_NEWS// 5h agoSECURITY INCIDENT

Bitwarden CLI hit in Checkmarx campaign

Socket says attackers slipped malicious code into the npm release of @bitwarden/cli@2026.4.0 after abusing Bitwarden’s CI/CD pipeline in the wider Checkmarx supply chain campaign. Bitwarden says the bad package was available only between 5:57 PM and 7:30 PM ET on April 22, 2026, and that it found no evidence of vault or production-system compromise.

// ANALYSIS

This is the nightmare version of software supply chain risk: the codebase can stay clean while the publish path gets poisoned. The real lesson for developers is that CI/CD and package-release controls are now part of the product surface, not just internal plumbing.

  • The compromise appears limited to the npm distribution path for the CLI, not Bitwarden’s browser extension, desktop apps, or stored vault data.
  • Socket’s analysis says the payload stole tokens, cloud creds, SSH material, and other secrets, making this a broader workstation and CI exposure issue than a simple package typo-squat.
  • Because the affected artifact was an official package version, trust signals like correct naming, repo metadata, and normal install commands were not enough to protect users.
  • This reinforces a growing pattern in OSS attacks: attackers target GitHub Actions, release automation, and publish permissions because they can bypass normal code review entirely.
  • Teams using Bitwarden CLI should verify whether `@bitwarden/cli@2026.4.0` was pulled from npm during the affected window, rotate exposed secrets, and audit runners and developer machines for follow-on abuse.
// TAGS
bitwarden-clibitwardenclidevtoolopen-sourcesafety

DISCOVERED

5h ago

2026-04-23

PUBLISHED

7h ago

2026-04-23

RELEVANCE

6/ 10

AUTHOR

tosh