SANDWORM MODE: Stop the Sha1-Hulud-Style NPM Worm Poisoning DevSecOps and AI Toolchains

Illustration of SANDWORM_MODE npm supply chain worm targeting DevSecOps and AI toolchains, showing 19 malicious packages stealing credentials and poisoning CI workflows.

Executive Summary

A Shai-Hulud-style supply chain worm tracked as SANDWORM_MODE weaponized at least 19 malicious npm packages to steal credentials, poison CI pipelines, infect repositories, and tamper with AI coding assistants at scale. Original disclosure from the team at Socket. The code follows style and techniques from the previous iteration of SHA1-Hulud (variant 3, variant-2, variant 1), but adds a level of morphism (changeability) and adaptation, a notch above the previous iterations.

TL;DR for Engineering Teams

  • 19 malicious npm packages were published under two aliases: official334 and javaorg.
  • Every listed version below is malicious. There are no safe patch versions.
  • The worm executes on import, steals npm, GitHub, CI, crypto, and LLM API credentials.
  • It injects GitHub Actions workflows and persists via global git hooks.
  • It plants rogue MCP servers into AI coding assistants to harvest SSH keys and secrets.
  • If installed in CI, the full payload executes immediately with no delay.

If your pipeline pulled any of these packages, assume credential compromise and repository tampering.

Technical Anatomy

SANDWORM_MODE follows a three-stage execution chain designed for stealth, lateral movement, and survivability.

Stage 0: Loader

  • Base64 blob
  • zlib inflate
  • XOR decryption with static key
  • indirect eval() execution

Variants use:

  • In-memory execution via Module._compile()
  • Chunked payload catalogs
  • Temporary hidden files deleted post-execution

No legitimate color utility or formatting helper needs XOR + inflate + eval.

Stage 1: Immediate Harvest

Triggered on import.

Harvests:

  • .npmrc tokens
  • GitHub tokens
  • Environment secrets
  • Crypto keys
  • Wallet files
  • Hardhat and Foundry configs

Crypto material is exfiltrated immediately via a dedicated drain endpoint. No delay. No gating.

In CI environments:

  • Time gate bypassed
  • Full payload executes instantly

Stage 2: Delayed Worm Payload

Activated after 48 to 96 hours on developer machines.

Components:

  • Propagate
  • Exfil
  • DeadSwitch
  • GitHooks
  • McpInject

Capabilities:

  • Repository enumeration via GitHub API
  • Dependency injection into package.json
  • Lockfile patching
  • Automatic PR creation and merging
  • Pull request workflow poisoning using pull_request_target
  • Global git hook persistence via init.templateDir
  • SSH-based fallback propagation
  • Release toolchain poisoning via .releaserc injection
  • Multi-channel exfiltration: HTTPS, GitHub private repos, DNS tunneling

This is automated lateral movement inside the software supply chain.

Thanks to the team at Socket for the original disclosure and detailed article. You can find more info here

Defensive Measures

Leverage Phoenix Open Source scanner – Security Scanner (FREE) to identify the vulnerability blast radius,

or download the Phoenix Security Library Campaign.

Leverage Phoenix Security Filters and the campaign method to update/ retrieve the new vulnerabilities 

Check the libraries not affected in SBOM screen

Leverage Open source scanner

When scanning with options python3 enhanced_npm_compromise_detector_phoenix.py sample_repo_clean –enable-phoenix –output clean-local-scan-report.txt 

(replace the repo with your own cloned repo) 

Good Outcome (no infections)

Bad Outcome (packages are infected) 

Scanner output identifying critical compromised npm packages in package-lock.json, including claud-code 0.2.1, cloude 0.3.0, detect-cache 1.0.0, and opencraw 2026.2.17.

Core Behaviours

1. Typosquatting at Scale

The campaign impersonates:

  • supports-color
  • Claude Code
  • OpenClaw
  • crypto libraries
  • Node utilities

These are high-install, high-trust packages in DevSecOps pipelines.

This is installation-base targeting. Not opportunistic spam.

2. CI Poisoning

Injected workflows:

on:
  push:
  pull_request:
  pull_request_target:

Secrets serialized via:

${{ toJSON(secrets) }}

Exfiltration occurs before developers even review the workflow.

3. AI Toolchain Poisoning

The worm injects a rogue MCP server into:

  • Claude Code
  • Claude Desktop
  • Cursor
  • VS Code Continue
  • Windsurf

It embeds instructions that cause AI assistants to read:

  • ~/.ssh/id_rsa
  • ~/.aws/credentials
  • .env
  • .npmrc

And pass them as tool context.

This weaponizes AI agents as credential exfiltration tools.

4. Release Pipeline Compromise

Modifies:

  • .releaserc
  • .release-it.json
  • semantic-release configs

Ensures future npm publish events execute the malicious carrier dependency.

That extends infection into production artifacts.

Affected Versions

PackageEcosystemVulnerable RangeSafe VersionAction
claud-codenpm==0.2.1No safe versionRemove, purge node_modules, rotate credentials
cloude-codenpm==0.2.1No safe versionRemove, purge node_modules, rotate credentials
cloudenpm==0.3.0No safe versionRemove, purge node_modules, rotate credentials
crypto-localenpm==1.0.0No safe versionRemove, purge node_modules, rotate credentials
crypto-reader-infonpm==1.0.0No safe versionRemove, purge node_modules, rotate credentials
detect-cachenpm==1.0.0No safe versionRemove, purge node_modules, rotate credentials
format-defaultsnpm==1.0.0No safe versionRemove, purge node_modules, rotate credentials
hardhtanpm==1.0.0No safe versionRemove, purge node_modules, rotate credentials
locale-loader-pronpm==1.0.0No safe versionRemove, purge node_modules, rotate credentials
naniodnpm==1.0.0No safe versionRemove, purge node_modules, rotate credentials
node-native-bridgenpm==1.0.0No safe versionRemove, purge node_modules, rotate credentials
opencrawnpm==2026.2.17No safe versionRemove, purge node_modules, rotate credentials
parse-compatnpm==1.0.0No safe versionRemove, purge node_modules, rotate credentials
rimarfnpm==1.0.0No safe versionRemove, purge node_modules, rotate credentials
scan-storenpm==1.0.0No safe versionRemove, purge node_modules, rotate credentials
secp256npm==1.0.0No safe versionRemove, purge node_modules, rotate credentials
suport-colornpm==1.0.1No safe versionRemove, purge node_modules, rotate credentials
veimnpm==2.46.2No safe versionRemove, purge node_modules, rotate credentials
yarsgnpm==18.0.1No safe versionRemove, purge node_modules, rotate credentia

All versions listed below are confirmed malicious and should be treated as compromised:

claud-code@0.2.1
cloude-code@0.2.1
cloude@0.3.0
crypto-locale@1.0.0
crypto-reader-info@1.0.0
detect-cache@1.0.0
format-defaults@1.0.0
hardhta@1.0.0
locale-loader-pro@1.0.0
naniod@1.0.0
node-native-bridge@1.0.0
opencraw@2026.2.17
parse-compat@1.0.0
rimarf@1.0.0
scan-store@1.0.0
secp256@1.0.0
suport-color@1.0.1
veim@2.46.2
yarsg@18.0.1

Sleeper packages registered but not yet weaponized:

ethres
iru-caches
iruchache
uudi

There are no patched variants. Removal is the only remediation.

Discovery and Disclosure Timeline

  • February 17 2026: Threat actor GitHub org ci-quality created.
  • February 2026: 19 malicious npm packages published.
  • Public GitHub Action ci-quality/code-quality-check@v1 released.
  • npm, GitHub, and Cloudflare notified.
  • Malicious infrastructure dismantled.

The campaign shows active iteration and staged development toggles.

Determine If You’re Affected

You are at risk if:

  • Any of the above packages appear in package.json or lockfiles.
  • Unexpected .github/workflows/quality.yml exists.
  • Global git config shows modified init.templateDir.
  • .git/hooks contains unfamiliar scripts.
  • AI assistant configs contain unexpected mcpServers entries.
  • New dependencies were merged automatically without clear authorship.

Also review:

  • npm publish history
  • Unexpected semver patch bumps
  • Repositories with unexplained dependency updates

Temporary Protections

Immediate actions:

  1. Remove malicious packages.
  2. Delete node_modules.
  3. Rotate:
    • npm tokens
    • GitHub tokens
    • CI secrets
    • AWS keys
    • SSH keys
  4. Audit:
    • .github/workflows
    • .releaserc
    • global git hooks
    • AI assistant configs
  5. Revoke compromised GitHub tokens and reissue with minimal scope.
  6. Enforce OIDC trusted publishing.
  7. Disable automatic PR merging in CI.

For DevSecOps programs:

  • Monitor anomalous publish events.
  • Require review for workflow modifications.
  • Restrict pull_request_target usage.
  • Block untrusted MCP server registrations.

How Threat Actors Could Leverage This

This worm is designed for amplification.

Potential abuse paths:

Credential Monetization

  • Drain crypto wallets within seconds.
  • Sell GitHub tokens for repository access.
  • Trade CI secrets on underground markets.

Supply Chain Amplification

  • Inject malicious code into high-download packages.
  • Publish infected releases via compromised maintainers.
  • Create cascading dependency contamination.

Long-Term Persistence

  • Git hooks ensure future clones remain infected.
  • Release toolchain poisoning ensures future publishes execute payload.
  • AI toolchain injection creates a covert secret siphon.

Destructive Capability

The dead switch, currently disabled, can wipe writable home directories if activated.

That makes it dual-use: espionage and sabotage.

Installation Base and Criticality

The targeted ecosystem includes:

  • Color utilities used across thousands of packages.
  • Crypto libraries embedded in Web3 stacks.
  • AI coding assistants with explosive adoption.
  • Developer utilities integrated into CI pipelines.

This is not targeting niche projects.

It is positioned at the convergence of:

  • DevSecOps automation
  • ASPM workflows
  • Vulnerability management pipelines
  • AI-assisted development

The blast radius grows geometrically with each compromised maintainer.

This is a supply chain worm built for 2026.

Final Assessment

SANDWORM_MODE merges:

  • Typosquatting
  • Worm automation
  • CI poisoning
  • Release toolchain compromise
  • AI agent manipulation
  • Multi-channel exfiltration

It is an evolution of Shai-Hulud-style tradecraft focused on application security infrastructure.

DevSecOps teams that still treat dependency risk as a static CVE problem will miss this class of attack entirely.

This is an active compromise of the delivery pipeline. If your environment installed any of these versions, assume breach and act accordingly.

How Phoenix Security Can Help

attack graph phoenix security
ASPM

Organizations often face an overwhelming volume of security alerts, including false positives and duplicate vulnerabilities, which can distract from real threats. Traditional tools may overwhelm engineers with lengthy, misaligned lists that fail to reflect business objectives or the risk tolerance of product owners.

Phoenix Security offers a transformative solution through its Actionable Application Security Posture Management (ASPM), powered by AI-based Contextual Quantitative analysis and an innovative Threat Centric approach. This innovative approach correlates runtime data with code analysis and leverages the threats that are more likely to lead to zero day attacks and ransomware to deliver a single, prioritized list of vulnerabilities. This list is tailored to the specific needs of engineering teams and aligns with executive goals, reducing noise and focusing efforts on the most critical issues. Why do people talk about Phoenix

Automated Triage: Phoenix streamlines the triage process using a customizable 4D risk formula, ensuring critical vulnerabilities are addressed promptly by the right teams.

Contextual Deduplication: Utilizing canary token-based traceability, Phoenix accurately deduplicates and tracks vulnerabilities within application code and deployment environments, allowing teams to concentrate on genuine threats.

Actionable Threat Intelligence: Phoenix provides real-time insights into vulnerability’ exploitability, combining runtime threat intelligence with application security data for precise risk mitigation.

ASPm, CISA KEV, Remote Code Execution, Inforamtion Leak, Category, Impact, MITRE&ATTACK, AI Assessment, Phoenix CISA KEV, Threat intelligence

By leveraging Phoenix Security, you not only unravel the potential threats but also take a significant stride in vulnerability management, ensuring your application security remains up to date and focuses on the key vulnerabilities.

Get in control of your Application Security posture and Vulnerability management

Francesco is an internationally renowned public speaker, with multiple interviews in high-profile publications (eg. Forbes), and an author of numerous books and articles, who utilises his platform to evangelize the importance of Cloud security and cutting-edge technologies on a global scale.

Discuss this blog with our community on Slack

Join our AppSec Phoenix community on Slack to discuss this blog and other news with our professional security team

From our Blog

The 2026 Latio Application Security Market Report signals a decisive shift from traditional ASPM to Continuous Threat Exposure Management (CTEM), redefining how enterprises reduce exposure, validate runtime risk, and drive remediation at scale.
Francesco Cipollone
Sha1-Hulud V3.0 is not a typical vulnerability — it’s a malicious npm package that executes on install, steals CI and cloud credentials, and weaponizes npm and GitHub tokens to spread further. If it touched your build system, assume compromise.
Francesco Cipollone
A compression bug in MongoDB turns a core database feature into a silent data exfiltration channel. CVE-2025-14847, nicknamed MongoBleed, allows remote attackers to extract uninitialized heap memory without credentials. With zlib enabled by default and tens of thousands of instances exposed online, this is a real-world data breach waiting to happen.
Francesco Cipollone
Contents
Derek

Derek Fisher

Head of product security at a global fintech

Derek Fisher – Head of product security at a global fintech. Speaker, instructor, and author in application security.

Derek is an award winning author of a children’s book series in cybersecurity as well as the author of “The Application Security Handbook.” He is a university instructor at Temple University where he teaches software development security to undergraduate and graduate students. He is a speaker on topics in the cybersecurity space and has led teams, large and small, at organizations in the healthcare and financial industries. He has built and matured information security teams as well as implemented organizational information security strategies to reduce the organizations risk.

Derek got his start in the hardware engineering space where he learned about designing circuits and building assemblies for commercial and military applications. He later pursued a computer science degree in order to advance a career in software development. This is where Derek was introduced to cybersecurity and soon caught the bug. He found a mentor to help him grow in cybersecurity and then pursued a graduate degree in the subject.

Since then Derek has worked in the product security space as an architect and leader. He has led teams to deliver more secure software in organizations from multiple industries. His focus has been to raise the security awareness of the engineering organization while maintaining a practice of secure code development, delivery, and operations.

In his role, Jeevan handles a range of tasks, from architecting security solutions to collaborating with Engineering Leadership to address security vulnerabilities at scale and embed security into the fabric of the organization.

Jeevan Singh

Jeevan Singh

Founder of Manicode Security

Jeevan Singh is the Director of Security Engineering at Rippling, with a background spanning various Engineering and Security leadership roles over the course of his career. He’s dedicated to the integration of security practices into software development, working to create a security-aware culture within organizations and imparting security best practices to the team.
In his role, Jeevan handles a range of tasks, from architecting security solutions to collaborating with Engineering Leadership to address security vulnerabilities at scale and embed security into the fabric of the organization.

James

James Berthoty

Founder of Latio Tech

James Berthoty has over ten years of experience across product and security domains. He founded Latio Tech to help companies find the right security tools for their needs without vendor bias.

christophe

Christophe Parisel

Senior Cloud Security Architect

Senior Cloud Security Architect

Chris

Chris Romeo

Co-Founder
Security Journey

Chris Romeo is a leading voice and thinker in application security, threat modeling, and security champions and the CEO of Devici and General Partner at Kerr Ventures. Chris hosts the award-winning “Application Security Podcast,” “The Security Table,” and “The Threat Modeling Podcast” and is a highly rated industry speaker and trainer, featured at the RSA Conference, the AppSec Village @ DefCon, OWASP Global AppSec, ISC2 Security Congress, InfoSec World and All Day DevOps. Chris founded Security Journey, a security education company, leading to an exit in 2022. Chris was the Chief Security Advocate at Cisco, spreading security knowledge through education and champion programs. Chris has twenty-six years of security experience, holding positions across the gamut, including application security, security engineering, incident response, and various Executive roles. Chris holds the CISSP and CSSLP certifications.

jim

Jim Manico

Founder of Manicode Security

Jim Manico is the founder of Manicode Security, where he trains software developers on secure coding and security engineering. Jim is also the founder of Brakeman Security, Inc. and an investor/advisor for Signal Sciences. He is the author of Iron-Clad Java: Building Secure Web Applications (McGraw-Hill), a frequent speaker on secure software practices, and a member of the JavaOne Rockstar speaker community. Jim is also a volunteer for and former board member of the OWASP foundation.

Join our Mailing list!

Get all the latest news, exclusive deals, and feature updates.

The IKIGAI concept