Particle.news

Download on the App Store

Nx npm Packages Compromised in 'S1ngularity' Attack With Second-Wave Exploitation Emerging

Researchers tie the breach to a flawed GitHub Actions workflow that exposed publish credentials.

Overview

  • Poisoned Nx releases were published on August 26 and removed within hours, affecting nx 20.9.0–20.12.0 and 21.5.0–21.8.0 plus select @nx plugins.
  • Maintainers report an unsafe pull_request_target workflow exposed a GITHUB_TOKEN and enabled theft of an npm publish token used to push malicious versions.
  • The postinstall payload scanned for tokens, SSH keys, API keys, and wallets, attempted to coerce local AI CLIs (Claude, Gemini, Q) for reconnaissance, uploaded results to victim-owned 's1ngularity-repository' GitHub repos, and inserted a shutdown command into .bashrc/.zshrc.
  • Wiz and GitGuardian observed 2,349 distinct secrets and over 1,000 valid GitHub tokens leaked across roughly a thousand repos before GitHub limited access to many of them.
  • StepSecurity now warns of follow-on abuse using stolen GitHub CLI OAuth tokens to expose and fork private repos, while Nx has revoked tokens, enforced 2FA, adopted Trusted Publisher, and urges users to assume compromise, rotate credentials, remove rogue repos, and clean startup files.