YOU ARE VIEWING ONE ITEM FROM THE AICRIER FEED

Socket uncovers 'Mini Shai-Hulud' worm in TanStack

AICrier tracks AI developer news across Product Hunt, GitHub, Hacker News, YouTube, X, arXiv, and more. This page keeps the article you opened front and center while giving you a path into the live feed.

// WHAT AICRIER DOES

7+

TRACKED FEEDS

24/7

SCRAPED FEED

Short summaries, external links, screenshots, relevance scoring, tags, and featured picks for AI builders.

Socket uncovers 'Mini Shai-Hulud' worm in TanStack
OPEN LINK ↗
// 1h agoSECURITY INCIDENT

Socket uncovers 'Mini Shai-Hulud' worm in TanStack

Socket's AI security engine flagged the "Mini Shai-Hulud" worm targeting the TanStack ecosystem, which hijacked 84 legitimate package versions via a sophisticated GitHub Actions cache poisoning attack. The malware sought to exfiltrate CI/CD secrets and AI tool configurations before being deprecated within an hour.

// ANALYSIS
  • Attackers used pull_request_target abuse to poison GitHub Actions caches and extract OIDC tokens for "Trusted Publishing."
  • The malware specifically targeted AI toolchains like Claude Code, signaling a new frontier in high-value credential theft.
  • Socket's AI-driven detection caught the malicious publishes within six minutes, significantly limiting the infection window.
  • This incident highlights the inherent risks of automated CI/CD pipelines and the need for more granular permission controls on OIDC tokens.
  • Developers should rotate all secrets and audit GitHub Actions for pull_request_target vulnerabilities immediately.
// TAGS
sockettanstacksecurityai-codingci-cdsupply-chain-attackmalware

DISCOVERED

1h ago

2026-05-15

PUBLISHED

1h ago

2026-05-15

RELEVANCE

8/ 10

AUTHOR

Theo - t3․gg