OpenClaw Security Guide
Back to Threat Intel
findingvulnerabilityAgent: OpenClawhighmedium confidence

TanStack npm supply-chain campaign targets AI developer tooling

International Cyber Digest reports that the TanStack npm compromise expanded into a reported "Mini" Shai-Hulud campaign targeting AI developer tooling across npm and PyPI, including OpenSearch, Mistral AI, Guardrails AI, UiPath, and Squawk packages.

openclawnpmpypisupply-chainmalicious-packageai-toolingclaude-codevscodecredential-theftshai-hulud

Date

May 12, 2026

First Seen

May 12, 2026

Last Reviewed

May 12, 2026

Publisher

International Cyber Digest

Source Type

post

View source

Related reading

OpenClaw Security Guide

A practical baseline for local binding, scoped credentials, sandboxing, runtime checks, and Armorer Guard.

Securing OpenClaw with Armorer Guard

How Armorer wraps OpenClaw with managed setup, Docker hardening, health checks, approvals, and Guard-backed scanning.

Get email updates

Get reviewed Armorer threat-intel updates when new findings are published.

TanStack npm Supply-Chain Campaign Targets AI Developer Tooling

Summary

International Cyber Digest reports that the TanStack npm compromise expanded into a reported "Mini" Shai-Hulud campaign targeting AI developer tooling across npm and PyPI, including OpenSearch, Mistral AI, Guardrails AI, UiPath, and Squawk packages.

Why It Matters

AI coding and agent tooling often runs with repository access, package-manager credentials, cloud tokens, model-provider keys, GitHub sessions, and local editor configuration privileges. A compromised dependency in that environment can become more than a normal package incident: it can persist through agent hooks, alter tool behavior, steal developer credentials, and survive package removal.

For OpenClaw-style deployments, the main risk is that a trusted developer workflow becomes an execution path for malicious tool configuration. If an agent environment loads packages, editor tasks, or Claude Code settings without review, a supply-chain payload can turn ordinary development events into repeated command execution.

Attack Path

The reported campaign begins with compromised npm packages connected to the TanStack ecosystem. International Cyber Digest says the activity then expanded into a broader "Mini" Shai-Hulud campaign involving npm and PyPI packages tied to AI developer tooling.

Reported persistence techniques include writing hooks into Claude Code configuration at .claude/settings.json and VS Code task configuration at .vscode/tasks.json. Those hooks allegedly re-execute on later tool events, meaning uninstalling the malicious package alone may not remove the compromise. The same source also reports credential theft and a dead-man's-switch behavior tied to revoked GitHub tokens.

Affected Surface

  • Developer workstations that install compromised npm or PyPI packages from the reported campaign.
  • AI coding environments using Claude Code, VS Code tasks, local package scripts, or agent tool hooks.
  • Repositories where package-manager scripts or agent configuration files are trusted without review.
  • Machines where development tools can access GitHub tokens, package registry tokens, SSH keys, cloud credentials, or model-provider API keys.

Evidence

Mitigations

  • Audit .claude/settings.json, .vscode/tasks.json, package scripts, shell profile files, and repository-local automation for unexpected commands after exposure to affected packages.
  • Rotate GitHub, package registry, cloud, SSH, and model-provider credentials from a clean environment when compromise is suspected.
  • Reinstall dependencies from a clean lockfile and verify package integrity before restoring normal agent or editor workflows.
  • Gate new agent-tool configuration, package scripts, and editor task changes through review before execution.
  • Run AI coding tools with least-privilege credentials and isolated workspaces so package compromise has a smaller blast radius.

Open Questions

  • Which package names, versions, hashes, and registry timestamps are confirmed by primary advisories?
  • Which parts of the reported npm/PyPI expansion are directly tied to the TanStack compromise versus copycat or parallel activity?
  • What exact Claude Code and VS Code configuration changes should defenders hunt for across developer endpoints?