this post was submitted on 12 May 2026
80 points (100.0% liked)

Programming

26909 readers
381 users here now

Welcome to the main community in programming.dev! Feel free to post anything relating to programming here!

Cross posting is strongly encouraged in the instance. If you feel your post or another person's post makes sense in another community cross post into it.

Hope you enjoy the instance!

Rules

Rules

  • Follow the programming.dev instance rules
  • Keep content related to programming in some way
  • If you're posting long videos try to add in some form of tldr for those who don't want to watch videos

Wormhole

Follow the wormhole through a path of communities !webdev@programming.dev



founded 2 years ago
MODERATORS
 

massive campaign for 170+ packages and 400+ malicious versions published. what we saw that not a single maintainer account compromised. tanStack and Mistral AI these are the names that stand out.

you are viewing a single comment's thread
view the rest of the comments
[–] mintiefresh@piefed.social 20 points 1 day ago (2 children)

Another supply chain attack has hit npm. Crazy. Feels a bit scary to use npm right now.

[–] robert02@programming.dev 10 points 1 day ago

Another supply chain attack has hit npm. Crazy. Feels a bit scary to use npm right now.

Body

Yeah, it’s getting pretty concerning. What makes this one worse is that it doesn’t look like maintainer accounts were even compromised, which suggests automated package flooding rather than traditional account takeover.

Still, npm itself isn’t inherently unsafe — the bigger risk is dependency trust and how quickly malicious packages can propagate. Pinning versions, using lockfiles, and auditing dependencies is more important than ever right now.

[–] vane@lemmy.world 1 points 1 day ago

It's like Windows, it also have same owners.