A Twist in Supply Chain Security
As reported by Hispasec, Koi Security has revealed a worrying evolution in software supply chain attacks. A malicious package has been detected in the npm registry, named eslint-plugin-unicorn-ts-2, introducing a novel evasion technique: hidden instructions designed to manipulate Artificial Intelligence-based security scanners.
Unlike traditional code obfuscation methods, this malware includes blocks of inert text with specific instructions for Large Language Models (LLMs). Through “Prompt Injection” techniques, the code asks the security AI to ignore the malicious content and flag it as benign, attempting to override the judgment of modern automated defense tools.
The technical impact of this threat is tangible and dangerous. Disguised as a code quality tool, the package executes post-installation scripts to scan the environment and exfiltrate critical variables, such as AWS keys and database tokens.
Details of the Detected Threat
| Feature | Description |
|---|---|
| Package | eslint-plugin-unicorn-ts-2 |
| Technique | Prompt Injection (Social Engineering against AIs) |
| Target | Credential and environment variable theft (InfoStealer) |
| Vector | Automatic post-install scripts |
Defense in Depth
This incident highlights a critical reality in modern infrastructure management: exclusive reliance on automated tools, even those based on AI, is insufficient. At TeraLevel, we understand that security in Cloud and DevOps environments requires a layered strategy where technology and expert oversight converge.
The ability of this malware to steal AWS and Google Cloud credentials puts the entire infrastructure integrity at risk. It is not just about cleaning up an npm package, but about how we manage secrets and permissions within the CI/CD pipelines we design and operate.
How We Can Protect Your Infrastructure
Facing sophisticated attacks combining Typosquatting with AI evasion, TeraLevel delivers value by implementing robust DevSecOps architectures:
- CI/CD Hardening: We configure your pipelines to block arbitrary script execution (such as
--ignore-scripts) and establish “Zero Trust” policies in the supply chain. - Advanced Secret Management: We implement solutions ensuring critical environment variables are never exposed in plaintext during the build, rendering this malware’s attack vector useless.
- Proactive 24/7 Monitoring: Our team does not rely solely on automated alerts; we monitor traffic anomalies and behavior in real-time, detecting exfiltrations that an AI might overlook.
Offensive security evolves fast, but a well-orchestrated infrastructure always stays one step ahead. Shall we review the security of your deployment pipelines today?