Mistral AI SDKs hit by Mini Shai-Hulud worm
Official Mistral AI SDKs on npm and PyPI were compromised by the Mini Shai-Hulud worm, a self-spreading supply chain attack detected in May 2026. The malware hijacks CI/CD secrets via OIDC token memory scraping to publish infected package versions that carry legitimate SLSA provenance attestations, making them invisible to many security tools.
This is a terrifying escalation in supply chain warfare that weaponizes legitimate provenance to bypass security systems. By hijacking the GitHub Actions OIDC signing flow, the worm publishes packages with valid SLSA Build Level 3 attestations while scraping process memory for masked CI/CD secrets. Its sophisticated persistence via IDE hooks and exfiltration through the GitHub GraphQL API marks a significant shift in automated package compromise.
DISCOVERED
1h ago
2026-05-14
PUBLISHED
2h ago
2026-05-14
RELEVANCE
AUTHOR
Better Stack