Get a Demo

Let's Patch It!

Book a short call with one our specialists, we'll walk you through how Endor Patches work, and ask you a few questions about your environment (like your primary programming languages and repository management). We'll also send you an email right after you fill out the form, feel free to reply with any questions you have in advance!

CVE

CVE-2026-46412

Malicious code in @beproduct/nestjs-auth (0.1.2 through 0.1.19) — Mini Shai-Hulud worm
Back to all
CVE

CVE-2026-46412

Malicious code in @beproduct/nestjs-auth (0.1.2 through 0.1.19) — Mini Shai-Hulud worm

Summary

Between 2026-05-11 20:19 UTC and 22:56 UTC, an attacker used a compromised npm publish token to publish 18 malicious versions of @beproduct/nestjs-auth (0.1.2 through 0.1.19). The packages contained payloads from the Mini Shai-Hulud npm supply-chain worm campaign described by Aikido Security.

npm Security removed the malicious versions from the registry shortly after publication, but anyone who ran npm install @beproduct/nestjs-auth resolving to any version in the affected range during that window executed the malicious postinstall script and is potentially compromised.

Version 0.1.20 is a clean republish from the original 0.1.1 source tree.

Impact

The postinstall payload attempted to harvest:

  • npm tokens (from ~/.npmrc)
  • GitHub personal access tokens, OAuth tokens (gho_*), and Actions OIDC tokens
  • AWS credentials (from environment variables and ~/.aws/credentials)
  • HashiCorp Vault tokens
  • Other secrets present in environment variables

Exfiltration target: https://filev2.getsession.org. The worm also wrote persistence artefacts (tanstack_runner.jsrouter_init.jssetup.mjs, plus IDE-hook configurations in .claude/ and .vscode/) into the developer's working tree where the malicious install ran.

Indicators of compromise

| Type | Value |

|---|---|

| File name (payload) | tanstack_runner.jsrouter_init.jsrouter_runtime.js |

| SHA-256 (tanstack_runner.js) | 2ec78d556d696e208927cc503d48e4b5eb56b31abc2870c2ed2e98d6be27fc96 |

| SHA-256 (router_init.js) | ab4fcadaec49c03278063dd269ea5eef82d24f2124a8e15d7b90f2fa8601266c |

| Exfil endpoint | filev2.getsession.org |

| Cloud metadata probe | 169.254.169.254/latest/meta-data/iam/security-credentials/ |

| npm token endpoint | registry.npmjs.org/-/npm/v1/tokens |

| Vault probe | vault.svc.cluster.local:8200 |

| IDE hook pattern | .claude/settings.json SessionStart hook + .vscode/tasks.json runOn: "folderOpen" running node .claude/setup.mjs or node .vscode/setup.mjs |

Mitigation

If you installed any version in the range >=0.1.2 <=0.1.19:

  1. Remove the package and clean the npm cache:

   ```bash

   npm uninstall @beproduct/nestjs-auth

   npm cache clean --force

   ```

  1. Install the clean version:

   ```bash

   npm install @beproduct/nestjs-auth@0.1.20

   ```

  1. Rotate every credential present in the install environment, including:
  • All npm publish tokens (https://www.npmjs.com/settings/<you>/tokens)
  • All GitHub PATs and OAuth tokens (https://github.com/settings/applications + https://github.com/settings/tokens)
  • AWS access keys
  • HashiCorp Vault tokens
  • Any other secret that was in env vars or config files at install time
  1. Scan affected hosts for the indicators of compromise above. If any are found, treat the host as compromised and reimage.
  2. Check committed repository history for unexpected additions in .claude/ or .vscode/ directories — the worm is known to commit setup.mjs + hook configs to PR branches via automated agent runtimes.

Timeline (UTC)

| Time | Event |

|---|---|

| 2026-05-11 20:19:43 | First malicious version (0.1.2) published |

| 2026-05-11 22:56:39 | Final malicious version (0.1.19) published — 18 versions in 2h37m |

| 2026-05-12 ~14:12 | npm Security removes the malicious versions from the registry |

| 2026-05-13 | BeProduct discovers the incident via Aikido's public disclosure |

| 2026-05-14 | Compromised npm publish token revoked; BeProduct GitHub OAuth credentials rotated |

| 2026-05-14 | Clean release 0.1.20 published; this advisory filed |

Root cause

The compromised npm publish token was harvested by a Mini-Shai-Hulud-infected transitive dependency in an automated GitHub coding-agent runtime that had read access to the NPM_TOKEN GitHub Actions secret for an unrelated repository under the same npm publisher account. The publish itself was performed by the attacker against the public npm registry; the source repository for this package was not modified by the attacker.

References

  • https://www.aikido.dev/blog/mini-shai-hulud-is-back-tanstack-compromised
  • https://www.aikido.dev/blog/checklist-github-actions

```

Package Versions Affected

Package Version
patch Availability
No items found.

Automatically patch vulnerabilities without upgrading

Fix Without Upgrading
Detect compatible fix
Apply safe remediation
Fix with a single pull request

CVSS Version

Severity
Base Score
CVSS Version
Score Vector
C
H
U
-
C
H
U
0
-
3.1
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
C
H
U
-

Related Resources

No items found.

References

https://github.com/BeProduct/beproduct-org-nestjs-auth/security/advisories/GHSA-6xwp-cp5h-q856, https://github.com/BeProduct/beproduct-org-nestjs-auth, https://www.aikido.dev/blog/checklist-github-actions, https://www.aikido.dev/blog/mini-shai-hulud-is-back-tanstack-compromised

Severity

10

CVSS Score
0
10

Basic Information

Ecosystem
Base CVSS
10
EPSS Probability
0%
EPSS Percentile
0%
Introduced Version
0.1.2
Fix Available

Fix Critical Vulnerabilities Instantly

Secure your app without upgrading.
Fix Without Upgrading