appsec.fyi

Supply Chain Security Resources

Post Share

A curated AppSec resource library covering XSS, SQLi, SSRF, IDOR, RCE, XXE, OSINT, and more.

Supply Chain Security

Software supply chain security addresses threats that target the dependencies, build systems, and distribution channels that modern applications rely on. High-profile incidents like SolarWinds, Log4Shell, and the xz backdoor demonstrated that attackers increasingly target upstream components rather than applications directly. Supply chain attacks include dependency confusion (substituting malicious packages with names matching internal packages), typosquatting in package registries, compromised maintainer accounts, malicious code injected into build pipelines, and trojanized development tools. Defenses include software bills of materials (SBOMs), dependency pinning and lock files, signature verification, provenance attestation (SLSA framework), regular dependency auditing with tools like Dependabot, Snyk, or Socket, and careful evaluation of new dependencies before adoption.

Date Added Link Excerpt
2026-04-22 NEW 2026Axios npm Supply Chain Attack: 83M Downloads HitAxios npm Supply Chain Attack: 83M Downloads Hit
2026-04-22 NEW 2026Axios npm Hijack 2026: Everything You Need to KnowAxios npm Hijack 2026: Everything You Need to Know
2026-04-22 NEW 2026TeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV FilesTeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV Files
2026-04-22 NEW 2026litellm: Credential Stealer Hidden in PyPI Wheellitellm: Credential Stealer Hidden in PyPI Wheel
2026-04-22 NEW 2026What's Coming to Our GitHub Actions 2026 Security RoadmapWhat's Coming to Our GitHub Actions 2026 Security Roadmap
2026-04-22 NEW 2026Shai-Hulud npm Supply Chain Attack: New Compromised Packages DetectedShai-Hulud npm Supply Chain Attack: New Compromised Packages Detected
2026-04-22 NEW 2026LiteLLM and Telnyx Compromised on PyPI: Tracing the TeamPCP Supply Chain CampaignLiteLLM and Telnyx Compromised on PyPI: Tracing the TeamPCP Supply Chain Campaign
2026-04-22 NEW 2026Keeping Your GitHub Actions Secure Part 1: Preventing Pwn RequestsKeeping Your GitHub Actions Secure Part 1: Preventing Pwn Requests
2026-04-22 NEW 2026GitHub Actions Security Pt 1: Attacks & Defenses (Wiz)GitHub Actions Security Pt 1: Attacks & Defenses (Wiz)
2026-04-19 NEW 2026Shai-Hulud: A Persistent Secret Leaking Campaign — GitGuardianShai-Hulud: A Persistent Secret Leaking Campaign — GitGuardian
2026-04-19 NEW 2026Defending Against npm Supply Chain Attacks — SplunkDefending Against npm Supply Chain Attacks — Splunk
2026-04-19 NEW 2026Multiple Supply Chain Attacks against npm Packages — Red HatMultiple Supply Chain Attacks against npm Packages — Red Hat
2026-04-19 NEW 2026Shai-Hulud Malware: Second-Wave npm Supply Chain AttackShai-Hulud Malware: Second-Wave npm Supply Chain Attack
2026-04-19 NEW 2026CISA: Widespread Supply Chain Compromise Impacting npm EcosystemCISA: Widespread Supply Chain Compromise Impacting npm Ecosystem
2026-04-17 NEW 2026Closing the Chain: How to reduce SolarWinds/Log4j/XZ risk (arXiv)Closing the Chain: How to reduce SolarWinds/Log4j/XZ risk (arXiv)
2026-04-17 NEW 2026SolarWinds Supply Chain Attack (Fortinet)SolarWinds Supply Chain Attack (Fortinet)
2026-04-17 NEW 2026ossf/malicious-packages: Reports of malicious open source packagesossf/malicious-packages: Reports of malicious open source packages
2026-04-17 NEW 20265 Examples of Dependency Confusion Attacks (Spectral)5 Examples of Dependency Confusion Attacks (Spectral)
2026-04-17 NEW 2026What Is a Dependency Confusion Attack? (Aqua Security)What Is a Dependency Confusion Attack? (Aqua Security)
2026-04-17 NEW 2026Defender's Perspective: Dep Confusion and Typosquatting (SLSA)Defender's Perspective: Dep Confusion and Typosquatting (SLSA)
2026-04-17 NEW 2026SBOMs in 2026: Some Love, Some Hate, Much AmbivalenceSBOMs in 2026: Some Love, Some Hate, Much Ambivalence
2026-04-17 NEW 2026Software Bill of Materials (SBOM) (CISA)Software Bill of Materials (SBOM) (CISA)
2026-04-17 NEW 2026About SLSA (spec v1.2)About SLSA (spec v1.2)
2026-04-17 NEW 2026What is a Software Bill of Materials (SBOM)? (Snyk)What is a Software Bill of Materials (SBOM)? (Snyk)
2026-04-17 NEW 2026SBOM Literature Review (arXiv)SBOM Literature Review (arXiv)
2026-04-17 NEW 2026SBOM + SLSA: Accelerating SBOM success with SLSASBOM + SLSA: Accelerating SBOM success with SLSA
2026-04-17 NEW 2026SLSA - Comprehensive Approach to Supply Chain Security (SBOM Observer)SLSA - Comprehensive Approach to Supply Chain Security (SBOM Observer)
2026-04-17 NEW 2026Understanding SBOM: Transparency & Security in Supply Chains (Cycode)Understanding SBOM: Transparency & Security in Supply Chains (Cycode)
2026-04-17 NEW 2026What We Know About the NPM Supply Chain Attack (Trend Micro)What We Know About the NPM Supply Chain Attack (Trend Micro)
2026-04-17 NEW 2026New Supply Chain Malware Operation Hits npm and PyPINew Supply Chain Malware Operation Hits npm and PyPI
2026-04-17 NEW 2026npm Supply Chain Attack: Debug, Chalk + 16 Packages Compromise (Upwind)npm Supply Chain Attack: Debug, Chalk + 16 Packages Compromise (Upwind)
2026-04-17 NEW 2026Malicious PyPI, npm, Ruby Packages Exposed (The Hacker News)Malicious PyPI, npm, Ruby Packages Exposed (The Hacker News)
2026-04-17 NEW 2026A Closer Look at Software Supply Chain Attacks 2025 (Xygeni)A Closer Look at Software Supply Chain Attacks 2025 (Xygeni)
2026-04-17 NEW 2026The PyPI Supply Chain Attacks of 2025: What Python Engineers Should LearnThe PyPI Supply Chain Attacks of 2025: What Python Engineers Should Learn
2026-04-16 NEW 2026Learnings from Recent npm Supply Chain Compromises - DatadogLearnings from Recent npm Supply Chain Compromises - Datadog
2026-04-16 NEW 2026Inside the Axios Supply Chain Compromise - Elastic Security LabsInside the Axios Supply Chain Compromise - Elastic Security Labs
2026-04-16 NEW 2026Lockfile Poisoning: Introducing Malware in Supply Chain - SafeDepLockfile Poisoning: Introducing Malware in Supply Chain - SafeDep
2026-04-16 NEW 2026Shai-Hulud 2.0: Most Aggressive NPM Supply Chain Attack of 2025 - Check PointShai-Hulud 2.0: Most Aggressive NPM Supply Chain Attack of 2025 - Check Point
2026-04-16 NEW 2026Supply Chain Security: Sigstore and Cosign - GitGuardianSupply Chain Security: Sigstore and Cosign - GitGuardian
2026-04-16 NEW 2026GuardDog: CLI Tool to Identify Malicious PyPI and npm PackagesGuardDog: CLI Tool to Identify Malicious PyPI and npm Packages
2026-04-16 NEW 2026tj-actions Supply Chain Attack (CVE-2025-30066) - Sysdigtj-actions Supply Chain Attack (CVE-2025-30066) - Sysdig
2026-04-16 NEW 2026tj-actions/changed-files Compromised - Semgreptj-actions/changed-files Compromised - Semgrep
2026-04-16 NEW 2026Most Notable Supply Chain Attacks of 2025 - KasperskyMost Notable Supply Chain Attacks of 2025 - Kaspersky
2026-04-16 NEW 2026GitHub Actions Supply Chain Attacks: tj-actions and reviewdog - HuntersGitHub Actions Supply Chain Attacks: tj-actions and reviewdog - Hunters
2026-04-11 2026DPRK Threat Actor Compromises Axios NPM PackageDPRK Threat Actor Compromises Axios NPM Package
2026-04-11 202616 Minutes to Impact: npm crypto-draining malware16 Minutes to Impact: npm crypto-draining malware
2026-04-11 2026Widespread npm Supply Chain Attack: Billions at RiskWidespread npm Supply Chain Attack: Billions at Risk
2026-04-11 2026npm Supply Chain Attack: debug, chalk, and Beyondnpm Supply Chain Attack: debug, chalk, and Beyond
2026-04-11 2026The Nx s1ngularity Attack: Inside the Credential LeakThe Nx s1ngularity Attack: Inside the Credential Leak
2026-04-11 2026s1ngularity: Nx supply chain attack leaks secretss1ngularity: Nx supply chain attack leaks secrets
2026-04-11 2026CISA 2025 Minimum Elements for SBOMCISA 2025 Minimum Elements for SBOM
2026-04-11 2026SLSA 3 Compliance with GitHub Actions and SigstoreSLSA 3 Compliance with GitHub Actions and Sigstore
2026-04-11 2026cosign Verification of npm Provenance and GitHub Attestationscosign Verification of npm Provenance and GitHub Attestations
2026-04-11 2026Securing CI/CD After tj-actions and reviewdog AttacksSecuring CI/CD After tj-actions and reviewdog Attacks
2026-04-11 2026GitHub Actions Supply Chain Attack: Coinbase to tj-actionsGitHub Actions Supply Chain Attack: Coinbase to tj-actions
2026-04-11 2026tj-actions/changed-files supply chain attacktj-actions/changed-files supply chain attack
2026-04-11 2026tj-actions/changed-files compromise (CVE-2025-30066)tj-actions/changed-files compromise (CVE-2025-30066)
2026-04-11 2026XZ Backdoor CVE-2024-3094 - JFrogXZ Backdoor CVE-2024-3094 - JFrog
2026-04-11 2026xz Backdoor CVE-2024-3094 - OpenSSFxz Backdoor CVE-2024-3094 - OpenSSF
2026-04-11 2026XZ Utils backdoor (CVE-2024-3094) overviewXZ Utils backdoor (CVE-2024-3094) overview
2026-04-11 2026Ultralytics PyPI package delivers coinminerUltralytics PyPI package delivers coinminer
2026-04-11 2026Supply-chain attack analysis: UltralyticsSupply-chain attack analysis: Ultralytics
2026-04-11 2026GitLab discovers widespread npm supply chain attackGitLab discovers widespread npm supply chain attack
2026-04-11 2026Shai-Hulud: Self-Replicating Worm Compromises 500+ NPM PackagesShai-Hulud: Self-Replicating Worm Compromises 500+ NPM Packages
2026-04-11 2026Shai-Hulud npm supply chain attack overviewShai-Hulud npm supply chain attack overview
2026-04-11 2026Shai-Hulud Worm Compromises npm EcosystemShai-Hulud Worm Compromises npm Ecosystem
2026-04-11 2026Shai-Hulud 2.0: 25K+ Repos ExposedShai-Hulud 2.0: 25K+ Repos Exposed
2026-04-11 2026Shai-Hulud 2.0: Detection and Defense GuidanceShai-Hulud 2.0: Detection and Defense Guidance
2026-04-11 2026Shai-Hulud 2.0 npm worm: analysisShai-Hulud 2.0 npm worm: analysis
2026-04-10 2026Supply Chain Attacks Are Exploiting Our AssumptionsSupply Chain Attacks Are Exploiting Our Assumptions
2026-04-10 2026Protecting Your Software Supply Chain: Typosquatting and Dependency ConfusionProtecting Your Software Supply Chain: Typosquatting and Dependency Confusion
2026-04-10 2026LiteLLM PyPI Packages Compromised in TeamPCP Supply Chain AttacksLiteLLM PyPI Packages Compromised in TeamPCP Supply Chain Attacks
2026-04-10 2026Supply-Chain Attack Defense: Developer Host Machine HardeningSupply-Chain Attack Defense: Developer Host Machine Hardening
2026-04-10 2026TeamPCP Credential Infostealer Chain Attack Reaches Python's LiteLLMTeamPCP Credential Infostealer Chain Attack Reaches Python's LiteLLM
2026-04-10 2026Compromised dYdX npm and PyPI Packages Deliver Wallet StealersCompromised dYdX npm and PyPI Packages Deliver Wallet Stealers
2026-04-10 2026N. Korean Hackers Spread 1,700 Malicious Packages Across npm, PyPI, Go, RustN. Korean Hackers Spread 1,700 Malicious Packages Across npm, PyPI, Go, Rust
2026-04-10 2026The Next Wave of Supply Chain Attacks: NPM, PyPI, and Docker HubThe Next Wave of Supply Chain Attacks: NPM, PyPI, and Docker Hub
2026-04-10 2026PyPI, npm, and the New Frontline of Software Supply Chain AttacksPyPI, npm, and the New Frontline of Software Supply Chain Attacks
2026-04-10 2026Malicious PyPI and npm Packages Exploiting Dependencies in Supply Chain AttacksMalicious PyPI and npm Packages Exploiting Dependencies in Supply Chain Attacks
2026-04-10 2026Supply Chain Attack: How Attackers Weaponize SoftwareSupply Chain Attack: How Attackers Weaponize Software
2026-04-10 20262026 Supply Chain Security Report: Attack Analysis2026 Supply Chain Security Report: Attack Analysis
2026-04-10 2026Securing Software Supply Chains: 2026 PrioritiesSecuring Software Supply Chains: 2026 Priorities
2026-04-10 20262026 Software Supply Chain Report2026 Software Supply Chain Report
2026-04-10 2026Supply Chain Attacks 2025-2026: Axios, Shai-Hulud, and MoreSupply Chain Attacks 2025-2026: Axios, Shai-Hulud, and More
2026-04-06 2026How to Prevent OWASP Software Supply Chain FailuresHow to Prevent OWASP Software Supply Chain Failures
2026-04-06 2026Axios Compromise on npm Introduces Hidden Malicious PackageAxios Compromise on npm Introduces Hidden Malicious Package
2026-04-06 2026NPM Supply Chain Attacks Explained: Dependency Confusion Exploits and DefenseNPM Supply Chain Attacks Explained: Dependency Confusion Exploits and Defense
2026-04-06 2026Axios npm Package Compromised in Supply Chain AttackAxios npm Package Compromised in Supply Chain Attack
2026-04-06 2026The 2026 Guide to Software Supply Chain SecurityThe 2026 Guide to Software Supply Chain Security
2026-04-03 202612 Months That Changed Supply Chain Security - 2025 Month by Month12 Months That Changed Supply Chain Security - 2025 Month by Month
2026-04-03 2026Securing the Software Supply Chain: OpenSSF, SLSA, SBOM, and SigstoreSecuring the Software Supply Chain: OpenSSF, SLSA, SBOM, and Sigstore
2026-04-03 2026OWASP Top 10 2025: A03 Software Supply Chain Failures (Beginner's Guide)OWASP Top 10 2025: A03 Software Supply Chain Failures (Beginner's Guide)
2026-04-03 2026SLSA Framework: The Definitive Guide for Securing Your Software Supply ChainSLSA Framework: The Definitive Guide for Securing Your Software Supply Chain
2026-04-03 2026Five Key Flaws Exploited in 2025's Software Supply Chain IncidentsFive Key Flaws Exploited in 2025's Software Supply Chain Incidents
2026-04-03 2026Predictions for Open Source Security in 2025 | OpenSSFPredictions for Open Source Security in 2025 | OpenSSF
2026-04-03 2026Supply Chain Attacks in Q4 2025: From Isolated Incidents to Systemic Failure ModesSupply Chain Attacks in Q4 2025: From Isolated Incidents to Systemic Failure Modes
2026-04-03 2026Supply Chain Security in CI: SBOMs, SLSA, and SigstoreSupply Chain Security in CI: SBOMs, SLSA, and Sigstore
2026-04-03 2026SLSA - Supply-chain Levels for Software ArtifactsSLSA - Supply-chain Levels for Software Artifacts
2026-04-03 2026A03 Software Supply Chain Failures - OWASP Top 10:2025A03 Software Supply Chain Failures - OWASP Top 10:2025
2026-04-03 2026What is Supply Chain Security? | GlossarySupply chain security focuses on risk management of external suppliers, vendors, logistics, and transportation.

Frequently Asked Questions

What is a software supply chain attack?
A supply chain attack targets the components, tools, or processes used to build software rather than the application itself. This includes compromising open-source packages, injecting malicious code into build pipelines, hijacking maintainer accounts, or distributing trojanized development tools — allowing attackers to affect thousands of downstream users simultaneously.
What is dependency confusion?
Dependency confusion (also called namespace confusion) exploits how package managers resolve dependencies. An attacker publishes a malicious package to a public registry with the same name as a private internal package. If the build system checks the public registry first or prefers higher version numbers, it installs the attacker's package instead of the legitimate internal one.
How do you defend against supply chain attacks?
Key defenses include maintaining a Software Bill of Materials (SBOM), using lock files and dependency pinning, enabling automated dependency scanning (Dependabot, Snyk, Socket), verifying package signatures and provenance, adopting the SLSA framework for build integrity, using private registries with allow-lists, and regularly auditing your dependency tree for known vulnerabilities.

Weekly AppSec Digest

Get new resources delivered every Monday.