Replies: 2 comments
-
|
💬 Your Product Feedback Has Been Submitted 🎉 Thank you for taking the time to share your insights with us! Your feedback is invaluable as we build a better GitHub experience for all our users. Here's what you can expect moving forward ⏩
Where to look to see what's shipping 👀
What you can do in the meantime 💻
As a member of the GitHub community, your participation is essential. While we can't promise that every suggestion will be implemented, we want to emphasize that your feedback is instrumental in guiding our decisions and priorities. Thank you once again for your contribution to making GitHub even better! We're grateful for your ongoing support and collaboration in shaping the future of our platform. ⭐ |
Beta Was this translation helpful? Give feedback.
-
|
Hi @Slaledev, thank you for reporting this — this is important security work. For visibility, you can also report this directly to NPM Security:
The GitHub Security team monitors these discussions, but a direct report ensures faster action. Thanks for helping keep the ecosystem safe! |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
🏷️ Discussion Type
Bug
Body
Hello,
I would like to report a suspicious npm account that may pose a supply chain risk to users.
While attempting to install the legitimate CodeRabbit CLI package, I came across a different package that appeared misleading. During further investigation, I identified the following npm account:
https://www.npmjs.com/~arihant1
This account has published multiple packages named after well-known developer tools (e.g., Alacritty, Tabnine, RunPod), which could confuse users into installing them unintentionally.
From my analysis, these packages exhibit similar behavior:
They execute a compiled Bun-based binary on the user’s system
The behavior is not clearly documented or expected for the impersonated tools
This pattern raises concerns about potential misuse or a supply chain attack vector, especially for users who may install packages by name without verifying the publisher.
I recommend reviewing this account and its published packages for potentially misleading or harmful behavior.
Thank you.
Beta Was this translation helpful? Give feedback.
All reactions