icon

NPM Supply Chain Attack

Last modified: 2023-07-12

An attacker might be able to lead an organization to install a malicious NPM package by abusing misconfiguration of the internal proxy server or package manager.

This page has lack of content yet.

Dependency Confusion

The PoC is available thanks to the researcher who discovered the threat.


Lock File Injection

Attackers may insert their malicious npm package into yarn.lock or package-lock.json in the target project.