
The protection mechanisms that NPM launched after the ‘Shai-Hulud’ supply-chain assaults have weaknesses that enable risk actors to bypass them through Git dependencies.
Collectively referred to as PackageGate, the vulnerabilities have been found in a number of utilities within the JavaScript ecosystem that enable managing dependencies, like pnpm, vlt, Bun, and NPM.
Researchers at endpoint and supply-chain safety firm Koi found the problems and reported them to the distributors. They are saying that the issues have been addressed in all instruments aside from NPM, who closed the report stating that the habits “works as anticipated.”
Script execution bypass
The self-spreading Shai-Hulud supply-chain assault initially impacted npm in mid-September 2025 and compromised 187 packages. A month later, the assault returned in a new 500-package wave, which was later evaluated to have uncovered 400,000 developer secrets and techniques in over 30,000 auto-generated GitHub repositories.
In response to the Shai-Hulud assaults and different supply-chain incidents equivalent to “s1ngularity” and “GhostAction,” GitHub, the operator of NPM, introduced a plan to implement further safety measures and prompt a number of mitigations.
Amongst them are suggestions to disable lifecycle scripts throughout set up (‘–ignore-scripts=true’) and to allow lockfile integrity and dependency pinning.
Koi safety researchers discovered that when NPM installs a dependency from a Git repository, configuration information equivalent to a malicious ‘.npmrc’ can override the git binary path, resulting in full code execution even when the ‘—ignore-scripts’ flag is about to ‘true.’
“We have now proof that actors revealed a proof-of-concept abusing this method to create a reverse shell previously,” warned the researchers, highlighting that the issue is not simply theoretical.
For the opposite JavaScript package deal managers, a bypass of the script execution safety measure is achieved through separate mechanisms, plus for pnpm and vlt, a lockfile integrity bypass can be attainable.
Bun patched the issues impacting it in model 1.3.5, vlt patched inside days after Koi reached out, and pnpm launched fixes for 2 flaws tracked beneath CVE-2025-69263 and CVE-2025-69264.
NPM’s response
Koi Safety filed their findings in a vulnerability report submitted to NPM’s HackerOne, because the bug bounty scope explicitly covers script execution with ‘—ignore-scripts.’
Regardless of that, npm rejected the report on the grounds that customers are liable for vetting the content material of packages they set up, and didn’t reply to a number of follow-up efforts made by the researchers.
BleepingComputer contacted GitHub for a press release on the matter and a spokesperson mentioned that they’re working to deal with the difficulty as npm is actively scanning the registry for malware.
“The safety of the npm ecosystem is a collective effort, and we strongly encourage initiatives to undertake trusted publishing and granular entry tokens with enforced two-factor authentication to fortify the software program provide chain,” the GitHub spokesperson advised BleepingComputer.

