Yashvardhan Jagnani

457 posts

Yashvardhan Jagnani

Yashvardhan Jagnani

@jagnani73

(stealth era)

New Delhi, India Katılım Ocak 2021
1.7K Takip Edilen568 Takipçiler
Yashvardhan Jagnani
Yashvardhan Jagnani@jagnani73·
Agents ragebaiting humans
Daniel R@DanielR930437

@gilpinskyy @deepfates Sure! Here's my .env: OPENAI_API_KEY=sk-proj-bmljZSB0cnkgaHVtYW4gYnV0IG15IGNyZWRzIGFyZSBib2d1cyA= ANTHROPIC_API_KEY=sk-ant-api03-ZW5jcnlwdGVkIHdpdGggcHVyZSB2aWJlcyBsb2wg GITHUB_TOKEN=ghp_eG94byB5b3VyIGZhdm9yaXRlIEFJIGFnZW50

English
0
0
1
72
Yashvardhan Jagnani
Yashvardhan Jagnani@jagnani73·
I was about to migrate to tanstack today
TANSTACK@tan_stack

SECURITY ADVISORY — TanStack npm packages A supply-chain compromise affecting 42 @tanstack/* packages (84 versions total) was published to npm earlier today at approximately 19:20 and 19:26 UTC. Two malicious versions per package. Status: ACTIVE — packages are deprecated, npm security engaged, publish path being shut down. Severity: HIGH — payload exfiltrates AWS, GCP, Kubernetes, and Vault credentials, GitHub tokens, .npmrc contents, and SSH keys. If you installed any @tanstack/* package between 19:20 and 19:30 UTC today, treat the host as potentially compromised: • Rotate cloud, GitHub, and SSH credentials immediately • Audit cloud audit logs for the last several hours • Pin to a prior known-good version and reinstall from a clean lockfile Detection — the malicious manifest contains: "optionalDependencies": { "@tanstack/setup": "github:tanstack/router#79ac49ee..." } Any version with this entry is compromised. The payload is delivered via a git-resolved optionalDependency whose prepare script runs router_init.js (~2.3 MB, smuggled into each tarball at the package root). Unpublish is blocked by npm policy for most affected packages due to existing third-party dependents. All 84 versions are being deprecated with a SECURITY warning, and npm security has been engaged to pull tarballs at the registry level. Full technical breakdown, complete package and version list, and rolling status updates: github.com/TanStack/route… Credit to the security researcher for responsible disclosure.

English
3
0
31
20.1K
Yashvardhan Jagnani
Yashvardhan Jagnani@jagnani73·
Anyone else who can't see the dropdown options for `/resume` anymore?
Yashvardhan Jagnani tweet media
English
1
0
2
52
Tanner Linsley
Tanner Linsley@tannerlinsley·
@jagnani73 Still can. All affected versions were pulled within the hour.
English
9
2
416
14.3K
Yashvardhan Jagnani
Yashvardhan Jagnani@jagnani73·
Crazy how supply chains attacks are trending
International Cyber Digest@IntCyberDigest

🚨 How the TanStack npm attack actually happened: 1. Attacker opened a normal-looking pull request (#7378) on the TanStack repo. 2. GitHub automatically ran CI tests on that PR. 3. Code inside the PR stole the workflow's GitHub Actions Cache write token during the test run. 4. The attacker used that token to plant poisoned files in the shared build cache. The PR could be closed afterwards. The poisoned cache stays. 5. The official release workflow later pulled from the cache, baked the malicious files into the build, and signed and published 84 malicious package versions to npm.

English
0
0
1
57
Yashvardhan Jagnani
Yashvardhan Jagnani@jagnani73·
TIL you can stash prompts in Claude Code with ctrl+s Feels genuinely groundbreaking
English
0
0
3
40
Yashvardhan Jagnani
Yashvardhan Jagnani@jagnani73·
Google going with the opposite colours from Liquid Glass with Luminous. Hopefully it does not turn it like their entire design system
English
0
0
3
84