Best of NPMSeptember 2025

  1. 1
    Article
    Avatar of collectionsCollections·36w

    Compromise of npm Packages Highlights Supply Chain Vulnerabilities

    A major security breach compromised 18 popular npm packages including debug and chalk through a phishing attack on maintainer credentials. The malicious code targeted cryptocurrency transactions by intercepting wallet interactions in browsers, though no funds were reportedly stolen. This represents the largest supply chain attack in npm's history, affecting packages with billions of weekly downloads.

  2. 2
    Article
    Avatar of shippingbytesshipping bytes·34w

    Buy vs build when it comes to dependency management

    Explores the evolution of developer perspectives on dependencies across career stages, from junior engineers wanting to learn by avoiding them, to mid-level developers embracing them for speed, to senior engineers being cautious about complexity. Compares software dependency decisions to manufacturing choices, arguing that both require careful cost-benefit analysis rather than blanket rules.

  3. 3
    Video
    Avatar of fireshipFireship·36w

    The largest supply-chain attack ever…

    A massive supply chain attack compromised popular npm packages including Chalk, affecting over 2.5 billion weekly downloads. The attack began with a phishing email targeting maintainer Josh Junan, leading to malicious code that swapped cryptocurrency wallet addresses in web browsers. Despite the widespread impact across JavaScript ecosystems and CI/CD pipelines, attackers only stole about $50 worth of Ethereum before the community detected and neutralized the threat within 2 hours.

  4. 4
    Article
    Avatar of krebsonsecurityKrebs on Security·35w

    Self-Replicating Worm Hits 180+ Software Packages – Krebs on Security

    A self-replicating worm called Shai-Hulud has infected over 180 NPM packages, stealing developer credentials and automatically spreading to other packages. The malware uses stolen NPM tokens to modify popular packages, creates public GitHub repositories to expose stolen secrets, and briefly compromised CrowdStrike packages. Security experts warn this represents a new type of supply chain attack that can lay dormant and restart spreading, calling for mandatory human-verified 2FA for all package publications.