← Supply-Chain Attack Compendium

tanstack-router

Incident Summary

TanStack npm packages compromised by Mini Shai-Hulud

TeamPCP's Mini Shai-Hulud worm compromised the TanStack Router release pipeline by chaining a pull_request_target "Pwn Request" pattern, GitHub Actions cache poisoning, and runtime extraction of a GitHub Actions OIDC trusted-publisher token from runner memory. On 2026-05-11 between 19:20 and 19:26 UTC, 84 malicious versions across 42 @tanstack/* npm packages were published with a malicious optional dependency on an orphan git commit. The install-time payload harvested cloud, Kubernetes, Vault, GitHub, npm, and SSH credentials, exfiltrated over the Session/Oxen network, and attempted self-propagation by republishing packages maintained by victims.

Date
2026-05-11
Category
Open Source
Target Surface
Package registry
Insertion Phase
CI/CD
Impact
Credential theft
Cause
CI/CD Exploit

What Was Affected

Package tanstack-router
LanguageJavaScript
ComponentLibrary
Artifact typesource archive
Domain typepackage host
Domain npmjs.com

Compromised Versions

Incident Context

Motive
Credential Theft
Attribution
Advanced Persistent Threat
Transitive
Yes
Observed Duration
0 days

Evidence

Compromised Artifacts

Indicators and Changes

Commits

External References

Source Data

Source record: oss/tanstack-router/meta.yaml