Replies: 1 comment 1 reply
-
I have gotten in the habit of searching packages on socket.dev before installing. I also think containers and GitHub Codespaces / Stackblitz (etc) are important to use. But basically, the responsibility is on you. |
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Select Topic Area
Product Feedback
Body
After looking at some of the affected packages in the Shai-Hulud attack, there are still infected versions available to download as the latest version as of now.
After reporting some of them manually and asking about the published IOCs, only specific packages were taken down.
There does not seem to be any effort to remove known malware from the registry.
This is a package pushed
2025-09-15T10:09:38.765Z
:This IOC is known for over 3 days now and I can still download it.
This old blog article about not fixing the package install scripts vulnerability contains some interesting sections regarding worms: https://blog.npmjs.org/post/141702881055/package-install-scripts-vulnerability
Is this still the case?
I know that the blog is from 2016(!), but when will packages be scanned for malware before being released to the public?
Beta Was this translation helpful? Give feedback.
All reactions