Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

980+ Articles
124+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI and More
Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI and More
NEWS

Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI and More

TeamPCP has expanded its supply chain attack campaign with a fresh Mini Shai-Hulud worm that compromised npm and PyPI packages from TanStack, UiPath, Mistral AI, OpenSearch, and Guardrails AI — modifying packages to steal credentials from CI/CD pipelines.

Dylan H.

News Desk

May 12, 2026
4 min read

TeamPCP — the threat actor behind a recent string of high-profile supply chain attacks — has launched a fresh wave of package compromises under a campaign dubbed Mini Shai-Hulud, targeting npm and PyPI packages from some of the most widely used open-source and AI tooling ecosystems.

The campaign has been linked to the compromise of packages from TanStack, UiPath, Mistral AI, OpenSearch, and Guardrails AI, with the modified packages delivering credential-stealing payloads designed to exfiltrate secrets from developer environments and CI/CD pipelines.

What Is Mini Shai-Hulud?

The Mini Shai-Hulud campaign name — a reference to the massive sandworms from Frank Herbert's Dune — follows TeamPCP's earlier Shai-Hulud and Mini Shai-Hulud attacks against SAP packages, PyTorch Lightning, and Intercom clients. The campaign is characterized by:

  • Package tampering — Legitimate npm and PyPI packages are modified to include malicious credential-harvesting code before republication
  • Self-spreading worm behavior — Compromised packages are designed to propagate infections to related packages and toolchains
  • CI/CD targeting — Payloads specifically target build environments to exfiltrate secrets, tokens, and API keys stored in pipeline configuration
  • Multi-registry attack surface — Simultaneous targeting of both npm (JavaScript) and PyPI (Python) registries maximizes reach

Affected Packages

PackageRegistryOrganization
TanStack packagesnpmTanStack
UiPath automation librariesPyPI/npmUiPath
Mistral AI SDK packagesPyPI/npmMistral AI
OpenSearch client librariesPyPI/npmOpenSearch Project
Guardrails AI packagesPyPIGuardrails AI

The affected npm packages have been modified to include malicious payloads that execute during installation or build processes.

Credential Theft Mechanism

The Mini Shai-Hulud payloads are engineered to:

1. Execute silently during npm install / pip install
2. Enumerate environment variables for secrets and tokens
3. Target CI/CD-specific variables (GitHub Actions, GitLab CI, Jenkins)
4. Exfiltrate credentials to TeamPCP-controlled infrastructure
5. Attempt to spread to other packages in the project dependency tree

The worm component attempts to compromise additional packages by abusing stolen maintainer tokens — a technique that can amplify the blast radius well beyond the initially compromised packages.

TeamPCP: Prolific Supply Chain Attacker

TeamPCP has emerged as one of the most active supply chain threat actors in 2026, responsible for a string of high-profile incidents:

  • Trivy GitHub Actions breach — Hijacked 75+ container image tags to steal CI/CD secrets
  • Bitwarden CLI compromise — Part of a broader Checkmarx supply chain campaign
  • SAP npm package attack — The original Mini Shai-Hulud wave targeting SAP-adjacent packages
  • PyTorch Lightning and Intercom client — Credential theft via tampered packages
  • Checkmarx Jenkins AST Plugin — Compromise of a widely used security scanning tool

Impact Assessment

The reach of this campaign is significant. TanStack packages (including TanStack Query, TanStack Table, and TanStack Router) are used by hundreds of thousands of JavaScript projects. Mistral AI's Python SDK is widely used in AI application development. Guardrails AI is embedded in LLM safety and validation pipelines across enterprise deployments.

Any organization that installed or updated these packages during the compromise window should:

  1. Audit CI/CD secrets — Rotate all tokens, API keys, and credentials that may have been exposed in build environments
  2. Check package hashes — Verify installed versions against known-good checksums from before the compromise
  3. Review pipeline logs — Look for unexpected network connections during build processes
  4. Enable dependency pinning — Lock package versions and use checksums to prevent silent updates
  5. Monitor for lateral movement — Check for unauthorized access attempts using any exposed credentials

Defensive Measures

The Mini Shai-Hulud campaign underscores the growing threat to open-source supply chains. Security teams should implement:

  • Software Composition Analysis (SCA) with real-time malicious package detection
  • Network egress filtering in CI/CD environments to detect data exfiltration attempts
  • Secrets scanning in pipelines and repositories
  • Package manager security policies (npm audit, pip audit, verified publishers)
  • Build isolation — Run builds in ephemeral, network-restricted environments where possible

Key Takeaway: TeamPCP's Mini Shai-Hulud campaign demonstrates that supply chain attackers are now systematically targeting AI tooling and developer infrastructure ecosystems — not just individual packages. Any organization using npm or PyPI packages from the affected projects should treat this as an active incident until credentials have been rotated.

References

  • The Hacker News — Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI

Related Reading

  • TeamPCP Compromises Checkmarx Jenkins AST Plugin
  • TeamPCP Hits SAP Packages with Mini Shai-Hulud Attack
  • Build Application Firewalls Aim to Stop the Next Supply Chain Attack
#Supply Chain#TeamPCP#npm#PyPI#Threat Intelligence#Worm#TanStack#Mistral AI

Related Articles

Worm Redux: Fresh Mini Shai-Hulud Infections Bite npm Supply Chain

Hundreds of npm packages in the TanStack open source ecosystem have been infected by a fresh wave of Mini Shai-Hulud worm activity from TeamPCP — the same self-propagating, credential-stealing malware that previously targeted Mistral AI, Guardrails AI, and SAP-related packages.

6 min read

TeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV Files

The TeamPCP threat actor — behind previous supply chain attacks on Trivy, KICS, and litellm — has now compromised the telnyx Python package on PyPI,...

4 min read

1,800 Hit in Mini Shai-Hulud Attack on SAP, Lightning, and Intercom

The TeamPCP threat group's Mini Shai-Hulud supply chain campaign compromised SAP-related npm packages along with PyTorch Lightning and Intercom client...

4 min read
Back to all News