A detailed technical breakdown of the 'Clinejection' supply chain attack against the Cline AI coding tool. An attacker exploited an AI-powered GitHub issue triage bot by crafting a malicious issue title containing a prompt injection payload. This tricked Claude into running npm install from an attacker-controlled commit,
Table of contents
An AI agent with too many permissionsStep 1: Prompt injection via issue titleStep 2: Pivoting via GitHub Actions cache poisoningStep 3: Nightly credentials \= production credentialsFrom disclosure to exploitation: What actually happenedThe OpenClaw payload: A curious choiceAI agents are the new CI/CD attack surfaceLow severity — high potential blast radiusDefending your CI/CD pipelines against AI-native attacksThe AI Security Crisis in Your Python EnvironmentSort: