Original Article Text

Click to Toggle View

Hackers can bypass npm’s Shai-Hulud defenses via Git dependencies. The defense mechanisms that NPM introduced after the 'Shai-Hulud' supply-chain attacks have weaknesses that allow threat actors to bypass them via Git dependencies. Collectively called PackageGate, the vulnerabilities were discovered in multiple utilities in the JavaScript ecosystem that allow managing dependencies, like pnpm, vlt, Bun, and NPM. Researchers at endpoint and supply-chain security company Koi discovered the issues and reported them to the vendors. They say that the problems were addressed in all tools except for NPM, who closed the report stating that the behavior "works as expected." Script execution bypass The self-spreading Shai-Hulud supply-chain attack initially impacted npm in mid-September 2025 and compromised 187 packages. A month later, the attack returned in a new 500-package wave, which was later evaluated to have exposed 400,000 developer secrets in over 30,000 auto-generated GitHub repositories. In response to the Shai-Hulud attacks and other supply-chain incidents such as "s1ngularity" and "GhostAction," GitHub, the operator of NPM, announced a plan to implement additional security measures and suggested several mitigations. Among them are recommendations to disable lifecycle scripts during installation (‘--ignore-scripts=true’) and to enable lockfile integrity and dependency pinning. Koi security researchers found that when NPM installs a dependency from a Git repository, configuration files such as a malicious ‘.npmrc’ can override the git binary path, leading to full code execution even when the ‘—ignore-scripts’ flag is set to ‘true.’ "We have evidence that actors published a proof-of-concept abusing this technique to create a reverse shell in the past," warned the researchers, highlighting that the problem isn't just theoretical. For the other JavaScript package managers, a bypass of the script execution security measure is achieved via separate mechanisms, plus for pnpm and vlt, a lockfile integrity bypass is also possible. Bun patched the flaws impacting it in version 1.3.5, vlt patched within days after Koi reached out, and pnpm released fixes for two flaws tracked under CVE-2025-69263 and CVE-2025-69264. NPM’s response Koi Security filed their findings in a vulnerability report submitted to NPM’s HackerOne, as the bug bounty scope explicitly covers script execution with ‘—ignore-scripts.’ Despite that, npm rejected the report on the grounds that users are responsible for vetting the content of packages they install, and did not respond to multiple follow-up efforts made by the researchers. BleepingComputer contacted GitHub for a statement on the matter and a spokesperson said that they are working to address the issue as npm is actively scanning the registry for malware.  "The security of the npm ecosystem is a collective effort, and we strongly encourage projects to adopt trusted publishing and granular access tokens with enforced two-factor authentication to fortify the software supply chain," the GitHub spokesperson told BleepingComputer. The 2026 CISO Budget Benchmark It's budget season! Over 300 CISOs and security leaders have shared how they're planning, spending, and prioritizing for the year ahead. This report compiles their insights, allowing readers to benchmark strategies, identify emerging trends, and compare their priorities as they head into 2026. Learn how top leaders are turning investment into measurable impact.

Daily Brief Summary

VULNERABILITIES // Security Flaws in NPM Allow Bypass of Shai-Hulud Defenses

Researchers at Koi Security identified vulnerabilities in JavaScript package managers, including npm, which allow threat actors to bypass Shai-Hulud defenses through Git dependencies.

The vulnerabilities, collectively named PackageGate, affect tools like pnpm, vlt, Bun, and npm, though all but npm have implemented fixes.

The Shai-Hulud supply-chain attack compromised 187 npm packages initially and later exposed 400,000 developer secrets across 30,000 GitHub repositories.

Despite Koi's report, npm did not address the issue, stating the behavior "works as expected," leaving users responsible for package vetting.

Bun, vlt, and pnpm have patched their respective vulnerabilities, with pnpm addressing two flaws tracked as CVE-2025-69263 and CVE-2025-69264.

GitHub, which operates npm, is actively scanning for malware and encourages projects to adopt security measures like two-factor authentication to protect the software supply chain.

The incident underscores the ongoing challenges in securing software supply chains and the importance of comprehensive security practices.