top of page

InvisiRisk Blog Posts


Axios npm Supply Chain Attack: Hijacked Maintainer Account Delivers RAT
Date Observed: March–April 2026 Ecosystem: npm, Node.js, CI/CD pipelines Targets: Axios npm package consumers: 100M+ weekly downloads across JavaScript and Node.js build environments Attack Type: Maintainer account compromise, malicious package publish, cross-platform RAT delivery Key Takeaways A North Korea-linked threat actor hijacked an Axios npm maintainer account and published malicious versions containing a cross-platform Remote Access Trojan Any CI/CD pipeline

Pranesh Shrestha
7 days ago5 min read


TeamPCP: How a Supply Chain Attack Hit Build Systems and CI/CD Pipelines
Date Observed : March 2026 Ecosystem : GitHub Actions, npm, PyPI Targets : Aqua Security Trivy, Checkmarx KICS, BerriAI LiteLLM Attack Type : Supply chain compromise, mutable tag hijacking, CI/CD credential theft, self-propagating worm, PyPI wheel backdoor Key Takeaways : TeamPCP targeted CI/CD pipelines, not just source code . The campaign abused trusted paths like GitHub Actions, npm, and PyPI. Once inside the pipeline, attackers could access secrets and credentials . Down

Pranesh Shrestha
Apr 75 min read


GlassWorm: Invisible-Code Supply Chain Worm Attack
Date Observed : October 2025 – ongoing (March 2026) Ecosystem : VS Code/OpenVSX extensions, npm packages, GitHub repositories Attack Type : Stealthy supply-chain compromise → hidden payload execution → credential theft → lateral spread Key Takeaways: Invisible payloads : Malicious code is hidden in Unicode characters, making it invisible in editors and diffs. Decentralized C2 : Uses Solana blockchain with Google Calendar fallback for resilient command delivery. Wide propagati

Pranesh Shrestha
Mar 304 min read


SANDWORM_MODE: How a Shai-Hulud-Style npm Worm Targets CI/CD Pipelines
Date of Discovery : February 20, 2026 Ecosystem : npm Type of Attack : Credential theft + AI tool compromise + worm propagation Scope : At least 19 typo-squatted npm packages Impact : Credential theft, GitHub Actions abuse, MCP injection, multi-channel exfiltration, and destructive fallback capability A coordinated supply chain attack targeted the npm ecosystem under the codename SANDWORM_MODE, disclosed by Socket Research Team on February 20, 2026. The campaign combines cred

Pranesh Shrestha
Mar 174 min read


Hackerbot-Claw: AI-Driven Pull Request Exploits in GitHub Actions CI/CD
Date Observed : Late February 2026 Ecosystem : GitHub Actions CI/CD Attack Type : Pull-request triggered workflow exploitation → Remote Code Execution (RCE) → Token theft Key Takeaways: Hackerbot-Claw exploited misconfigured GitHub Actions workflows using malicious pull-request (PR) input. The attack executed inside the CI/CD build environment, not in merged code. Once tokens were exposed, attackers could modify repositories and publish artifacts. A recent campaign attributed

Pranesh Shrestha
Mar 174 min read


Why Traditional DevOps Security Tools Miss CI/CD Pipeline Attacks
by Tom Hamilton, CTO and Co-Founder, InvisiRisk, Inc. Key Takeaways: CI/CD pipeline attacks increasingly target build systems and pipeline configuration, not just source code. SCA, SAST, DAST, and IaC tools are still essential, but they do not stop build-time secret exfiltration, build-environment tampering, or runtime abuse inside the pipeline. A Build Application Firewall (BAF) enforces security policies inline during the build by understanding build communications protocol

Tom Hamilton
Mar 174 min read


Why the AWS CodeBreach Vulnerability Is a Reminder We Can’t Ignore
Vulnerabilities are inevitable, but a successful breach doesn't have to be. We aren't just scanning known vulnerabilities; we are ensuring that even if an attacker finds a way into your build system, they cannot get your data out.

Eric Pulaski
Jan 193 min read


Shai-Hulud Worm Reloaded: A New Wave of NPM Supply Chain Attacks and How InvisiRisk Stops It
Between November 21-23, the Shai-Hulud worm returned in a more aggressive form, rapidly spreading through the NPM ecosystem and Maven, compromising tens of thousands of repositories. InvisiRisk Build Application Firewall (BAF) includes a robust set of default security policies that enforce expected build behavior. The "Unauthorized PUT" policy serves as a critical defense against attacks like Shai-Hulud.

Pranesh Shrestha
Dec 2, 20254 min read


The 's1ngularity' Attack: Weaponizing AI CLI Tools and How InvisiRisk Stops It
The nx 's1ngularity' attack is a powerful reminder that supply chain security requires more than just scanning dependencies. InvisiRisk provides the proactive, real-time defense needed to secure the modern software development lifecycle.

Pranesh Shrestha
Oct 21, 20256 min read


Shai-Hulud NPM Worm Attack: Overview and InvisiRisk Protection
InvisiRisk’s BAF enforces defensive rules in the build pipeline (trusted registries/SCM, blocked packages, secret-leak prevention, response checks, git protections), and the Build Security AI Agent feature provides behavioral detection for novel, suspected worm-style activities. The defensive rules and the agent work together to stop supply-chain worms and credential-theft campaigns from spreading through your builds.

Pranesh Shrestha
Sep 25, 20255 min read


The Great NPM Heist – What Happened and How InvisiRisk Protects You
Integrating InvisiRisk Build Application Firewall into your development workflow is a practical way to ensure that even if attackers try to slip malware into NPM or Git, your build process will catch it and shut it down before any damage is done.

Pranesh Shrestha
Sep 19, 20256 min read


Git's Silent Takeover: How a Simple Clone Command Can Compromise Your Entire System
This post breaks down how this attack works, it’s devastating potential, and demonstrates how InvisiRisk's Build Application Firewall (BAF) provides a crucial, proactive defense by preventing the use of vulnerable GIT versions before they can be exploited.

Pranesh Shrestha
Sep 9, 20254 min read


GitHub's 'Pwn Request' misconfiguration: How InvisiRisk BAF Shields Your CI/CD from Hidden Threats
The dynamic nature of CI/CD pipelines necessitates a solution that can identify and block threats as they happen. InvisiRisk BAF acts as a vigilant guardian for your build process, ensuring that even if a vulnerability is present, it cannot be successfully exploited. By shifting from a reactive to a proactive security model, you can confidently leverage the power of automation without compromising the integrity of your software supply chain.

InvisiRisk, Inc.
Jul 14, 20255 min read


InvisiRisk Unveils Groundbreaking Build Security AI Agent
InvisiRisk, Inc. is excited to announce the launch of its revolutionary Build Security AI Agent, designed to transform the security landscape of software supply chains. This innovative solution leverages advanced artificial intelligence to provide unparalleled protection for CI/CD pipelines, ensuring the integrity and security of software development processes.

InvisiRisk, Inc.
May 8, 20252 min read


Why Your Secrets Faucet is Still Leaking
InvisiRisk BAF is an advanced security platform that strengthens software build processes against supply chain threats. It offers real-time defense by applying default security policies that block known vulnerabilities, ensure the use of trusted sources, and restrict unauthorized activities during builds.

InvisiRisk, Inc.
Apr 30, 20253 min read


Don't Let a Typo Sink Your Ship: How InvisiRisk BAF Fights The Silent Threat of Typosquatting
Typosquatting attacks are a silent but significant threat in the software supply chain. Relying solely on manual vigilance is no longer sufficient. Our Build Application Firewall (BAF) is designed with a robust set of default security policies to protect your applications from various vulnerabilities.

InvisiRisk, Inc.
Apr 17, 20254 min read


Could Standard Security Attestations, Powered by InvisiRisk, Have Shielded the NHS supplier from the £3m ICO Fine?
The ICO fine levied against , Advanced Computer Software Group Ltd, serves as a stark reminder of the importance of supply chain security.

InvisiRisk, Inc.
Apr 3, 20252 min read


CVE-2025-29927: Middleware Authorization Bypass in Next.js and How InvisiRisk BAF Prevents it
InvisiRisk BAF’s layered, real-time security stops attacks like the Ultralytics/Action Compromise

InvisiRisk, Inc.
Apr 1, 20253 min read


How InvisiRisk BAF Effectively Mitigates GitHub Actions Supply Chain Attacks Like the Ultralytics/Action Compromise
InvisiRisk BAF’s layered, real-time security stops attacks like the Ultralytics/Action Compromise

InvisiRisk, Inc.
Mar 27, 20254 min read


In-Depth Analysis: How InvisiRisk BAF Effectively Mitigates GitHub Actions Supply Chain Attacks Like the tj-actions/changed-files Compromise (CVE-2025-30066)
InvisiRisk BAF is a security solution specifically designed to protect the software build process from various threats.

InvisiRisk, Inc.
Mar 26, 20254 min read
bottom of page