Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

npm updates and considerations to strengthen your supply chain

New discoveries in biomechanics by highly accurate digital twins

PPPL’s ​​MRI experiment sheds light on planet and star formation

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » npm updates and considerations to strengthen your supply chain
Identity

npm updates and considerations to strengthen your supply chain

userBy userFebruary 13, 2026No Comments5 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

hacker newsFebruary 13, 2026Supply Chain Security/DevSecOps

In December 2025, in response to the Sha1-Hulud incident, npm completed a major certification review aimed at reducing supply chain attacks. While this overhaul is a solid step forward, this change does not make npm projects immune to supply chain attacks. npm remains susceptible to malware attacks – here’s what you need to know for a safer Node community.

Let’s start with the original problem

Historically, npm relied on classic tokens: credentials that can last indefinitely, are long-lived, and have wide scope. If stolen, an attacker could publish a malicious version directly in the author’s package (no publicly verifiable source code required). This has made npm a major vector for supply chain attacks. Over time, numerous real-world incidents have demonstrated this point. Shai-Hulud, Sha1-Hulud, and choke/debug are recent examples of notable attacks.

npm solution

To address this, npm has made the following changes:

npm has revoked all classic tokens and defaulted to session-based tokens instead. The npm team has also improved token management. Interactive workflows now use short-lived session tokens (typically 2 hours) obtained via npm login. Publishing uses MFA by default. The npm team also encourages OIDC Trusted Publishing, where CI systems retrieve short-lived credentials for each run rather than storing secrets.

Combining these will improve security. These allow credentials to expire quickly and require a second factor during sensitive operations.

Two important questions remain

First, it’s important to remember that the first attacks against tools like ChalkJS were successful MFA phishing attempts on the npm console. If you look at the original email attached below, you’ll see that it’s a phishing email focused on MFA (don’t get flamed if you’re trying to do the right thing). The campaign tricked administrators into sharing both user logins and one-time passwords. This means that in the future, similar emails may obtain short-lived tokens, but still give attackers enough time to upload malware (as this only takes a few minutes).

Second, MFA when publishing is optional. Developers can create 90-day tokens with MFA bypass enabled in the console. This is very similar to the previous classic token.

These tokens allow you to read and write packages managed by the token creator. This means that once a malicious party gains access to a maintainer’s console using these token settings, they can publish new malicious packages (and versions) on behalf of their authors. This goes back to the original problem with npm before adjusting the credential policy.

Make no mistake: More developers using MFA when publishing is good news, and should lead to fewer and smaller attacks in the future. However, making OIDC and MFA optional at the time of publication leaves the core issue unresolved.

In conclusion, developers need to be aware of the supply chain risks that still exist if (1) MFA phishing is to keep npm’s console working, and (2) console access is equivalent to access to publish new packages/versions.

Recommendations

In the spirit of open source security, here are three recommendations that I hope GitHub and npm consider in the future.

Ideally, they will continue to promote OIDC adoption over the long term. OIDC is extremely difficult to compromise and almost completely eliminates the problems surrounding supply chain attacks. More realistically, enforcing MFA on local package uploads (via email codes or one-time passwords) further reduces the explosive radius of worms like Shai-Hulud. That is, the improvement is to disallow custom tokens that bypass MFA. At the very least, it’s a good idea to add metadata to package releases so that developers can take precautions and avoid packages (or maintainers) that don’t have supply chain security measures in place.

In short, npm has taken an important step by eliminating persistent tokens and improving defaults. Until short-lived, identity-associated credentials become the norm and automation no longer requires MFA bypass, supply chain risks from compromised build systems will remain substantial.

new way

All this time we’ve been talking about supply chain attacks by uploading packages to npm on behalf of maintainers. It would be better if all npm packages could be built from verifiable upstream source code, rather than downloading artifacts from npm. That’s exactly what Chainguard is doing for its customers with the Chainguard library for JavaScript.

We examined the public database of compromised packages across npm and found that for 98.5% of malicious packages, the malware was not present in the upstream source code (only in the public artifacts). This means that our build-from-source approach reduces the attack surface by approximately 98.5%, based on historical data, as Chainguard’s JavaScript repository does not expose malicious versions available on npm.

In an ideal world, customers would be most secure when using the Chainguard library and applying the recommendations above. According to the “Swiss Cheese Model of Security,” all of these features are additional layers of security measures, and businesses are best able to use them in conjunction.

If you would like to learn more about the Chainguard library for JavaScript, please contact our team.

Note: This article was thoughtfully written and contributed to our readers by Adam La Morre, Senior Solutions Engineer at Chainguard.

Was this article interesting? This article is a contribution from one of our valued partners. Follow us on Google News, Twitter, and LinkedIn to read more exclusive content from us.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleNew discoveries in biomechanics by highly accurate digital twins
user
  • Website

Related Posts

Researchers observe real-world exploitation of BeyondTrust CVSS 9.9 vulnerability

February 13, 2026

Google reports state-sponsored hackers are using Gemini AI to support reconnaissance and attacks

February 12, 2026

Lazarus campaign plants malicious packages in npm and PyPI ecosystem

February 12, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

npm updates and considerations to strengthen your supply chain

New discoveries in biomechanics by highly accurate digital twins

PPPL’s ​​MRI experiment sheds light on planet and star formation

Researchers observe real-world exploitation of BeyondTrust CVSS 9.9 vulnerability

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.