
Colin
420 posts

Colin
@contracthaxor
Securing AI and building security-first automation @daybreaksc Auditor - @SecurityOak


Our first Blog post is live, Introduction to RustPack 🔥 msecops.de/blog/posts/rus… More to follow in the future for sure!







🚨 Active supply chain attack hitting SAP’s CAP ecosystem on npm. Four packages tied to SAP’s Cloud Application Programming Model just shipped versions with a new preinstall script that downloads and executes a platform-specific binary. These packages never required this before today. Affected versions: • mbt@1.2.48 • @cap-js/db-service@2.10.1 • @cap-js/postgres@2.2.2 • @cap-js/sqlite@2.2.2 Combined, these packages see 570K+ weekly downloads. @cap-js/db-service and @cap-js/sqlite alone account for ~510K of that. If you’re building on SAP BTP or using MTA deployment pipelines, check your lockfiles now. The compromised versions added a preinstall script that acts as a bootstrapper: it downloads a Bun ZIP from GitHub Releases, extracts it, and immediately executes the binary. It follows HTTP redirects without validating the destination. On Windows, it invokes PowerShell with -ExecutionPolicy Bypass. All four versions were published within a ~2.5 hour window this morning (April 29, UTC). At least one version (@cap-js/sqlite@2.2.2) has already been unpublished. Socket flagged the malicious behavior and is continuing to investigate. If you’re affected: • Do not install the affected versions • Pin to previous known-good versions • Rotate any credentials or tokens exposed in build/dev environments • Review CI/CD logs for unexpected network calls or binary execution Developing story…















