Gallery

Contacts

411 University St, Seattle, USA

engitech@oceanthemes.net

+1 -800-456-478-23

Threat actor TeamPCP compromised the TanStack npm package and 160+ additional packages with a self-propagating worm that stole GitHub Actions workflow tokens from CI/CD pipelines. Grafana Labs confirmed on May 19, 2026 that an unrotated workflow token left over from initial remediation allowed attackers to access private source code and internal operational data; victims also include OpenAI, Mistral AI, and GitHub itself. The business risk is significant: stolen source code, exposure of internal infrastructure secrets, and demonstrated attacker willingness to escalate to extortion create compounded financial, operational, and reputational exposure.

Author

Tech Jacks Solutions