<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Npm on investigator&#39;s notes</title>
    <link>https://karmine05.github.io/dirtyfrag-blog/tags/npm/</link>
    <description>Recent content in Npm on investigator&#39;s notes</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Tue, 12 May 2026 08:00:00 -0400</lastBuildDate>
    <atom:link href="https://karmine05.github.io/dirtyfrag-blog/tags/npm/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Mini Shai-Hulud: Detecting a Live npm Supply Chain Worm with Fleet</title>
      <link>https://karmine05.github.io/dirtyfrag-blog/posts/mini-shai-hulud-tanstack-supply-chain/</link>
      <pubDate>Tue, 12 May 2026 08:00:00 -0400</pubDate>
      <guid>https://karmine05.github.io/dirtyfrag-blog/posts/mini-shai-hulud-tanstack-supply-chain/</guid>
      <description>CVE-2026-45321 is an active npm supply chain worm daemonizing on install and harvesting developer credentials across GitHub Actions, AWS, Vault, and Kubernetes. Full IoC set, Fleet detection tooling, and results from scanning 30 hosts — plus the critical gap in Fleet&amp;#39;s npm table and why the deep scan scripts exist.</description>
    </item>
  </channel>
</rss>
