Socket uncovers 'Mini Shai-Hulud' worm in TanStack
Socket's AI security engine flagged the "Mini Shai-Hulud" worm targeting the TanStack ecosystem, which hijacked 84 legitimate package versions via a sophisticated GitHub Actions cache poisoning attack. The malware sought to exfiltrate CI/CD secrets and AI tool configurations before being deprecated within an hour.
- –Attackers used pull_request_target abuse to poison GitHub Actions caches and extract OIDC tokens for "Trusted Publishing."
- –The malware specifically targeted AI toolchains like Claude Code, signaling a new frontier in high-value credential theft.
- –Socket's AI-driven detection caught the malicious publishes within six minutes, significantly limiting the infection window.
- –This incident highlights the inherent risks of automated CI/CD pipelines and the need for more granular permission controls on OIDC tokens.
- –Developers should rotate all secrets and audit GitHub Actions for pull_request_target vulnerabilities immediately.
DISCOVERED
1h ago
2026-05-15
PUBLISHED
1h ago
2026-05-15
RELEVANCE
AUTHOR
Theo - t3․gg