Crypto Times Logo Black
Google News Follow Banner
  • News
    • Market
    • Bitcoin
    • Ethereum
    • Altcoins
    • Regulations & Policies
    • DeFi News
    • Blockchain News
    • Industry
  • Exclusive
    ExclusiveShow More
    CLARITY Act Clears Senate Banking Committee 15-9 Here’s What Every Crypto Leader Is Saying
    CLARITY Act Clears Senate Banking Committee 15-9: Here’s What Every Crypto Leader Is Saying
    GENIUS Act stablecoin regulation 2026 — US Treasury, OCC, FDIC and NCUA rulemaking on federal vs state oversight
    GENIUS Act at 10 Months: Inside America’s New Stablecoin Rulebook
    $10.8 Million Drained Inside the THORChain Exploit That Froze Cross-Chain DeFi for 13 Hours
    $10.8 Million Drained: Inside the THORChain Exploit That Froze Cross-Chain DeFi for 13 Hours
    BG Wealth and DSJ Exchange collapse exposes 2026 crypto scam pipeline
    How BG Wealth and DSJ Exposed the New Pipeline Model Behind 2026 Crypto Fraud
    Chainalysis’ Regional Director on Asia’s Crypto Growth and Stablecoin Revolution
    Exclusive: Chainalysis’ Regional Director on Asia’s Crypto Growth and Stablecoin Revolution
  • Opinion
    OpinionShow More
    The CLARITY Act The Final Hand — Everyone's Bluffing, Nobody's Folding, and Thursday Changes Everything
    The CLARITY Act: The Final Hand — Everyone’s Bluffing, Nobody’s Folding, and Thursday Changes Everything
    WazirX Debuts ‘Guardians of Trust’ Hub Security Pivot or Distraction from the 15% Debt
    WazirX Debuts ‘Guardians of Trust’ Hub: Security Pivot or Distraction from the 15% Debt?
    What Does Bitcoin Become in a World Questioning the Dollar?
    What Does Bitcoin Become in a World Questioning the Dollar?
    What Happens to the One Asset Designed to Escape Control
    What Happens to the One Asset Designed to Escape Control?
    A System Built on Control, and a Question That Refuses to Settle
    A System Built on Control, and a Question That Refuses to Settle
  • Learn
    • Explained
    • How To
    • Insights
  • Podcasts
  • More
    • About Us
    • Our Authors
    • Contact Us
    • Editorial Policy
The Crypto TimesThe Crypto Times
  • All News
  • Market
  • Bitcoin
  • Ethereum
  • Altcoins
  • Regulations & Policies
  • Blockchain
  • DeFi
  • Industry
  • Exclusive
  • Opinion
Search
  • News
    • Market
    • Bitcoin
    • Ethereum
    • Altcoins
    • Regulations & Policies
    • Blockchain
    • DeFi
    • Industry
    • Exclusive
    • Opinion
  • Learn
    • Explained
    • How To
    • Insights
  • Quick Links
    • About Us
    • Our Authors
    • Contact Us
    • Editorial Policy
    • AI Policy
    • Sponsored & Advertorial Policy
  • Podcasts
Follow US
© 2026 By Crypto Times. All Rights Reserved.
DeFi News

GitHub Investigates Internal Repo Breach Tied to Poisoned VS Code Task

The platform said the breach remained confined to internal repositories with no evidence of impact on customers or enterprise systems.

Written By:
Divya Mistry

Last updated: 38 minutes ago
Published 38 minutes ago
Share
Last updated: 38 minutes ago
Published 38 minutes ago
GitHub Investigates Internal Repo Breach Tied to Poisoned VS Code Task
Show AI Summary
GitHub’s internal repositories were breached via a compromised employee device
Attackers exploited a vulnerability in VS Code’s task mechanism to gain access
The malware used targets developer credentials and local files, including crypto wallet secrets

GitHub is investigating unauthorized access to its internal repositories after attackers compromised an employee device through a poisoned VS Code task mechanism (injected .vscode/tasks.json that auto-executes on folder open, as documented in the Mini Shai-Hulud campaign). In a post on X, the company said it detected and contained the breach quickly, removed the malicious configuration, isolated the affected system, and began rotating sensitive credentials.

So far, GitHub said the incident appears limited to internal repositories and has not affected customer repositories, enterprise environments, or external user data. However, the company acknowledged that attacker claims involving roughly 3,800 repositories are broadly consistent with its ongoing investigation, while security teams continue reviewing logs and monitoring for further suspicious activity.

1/ We are sharing additional details regarding our investigation into unauthorized access to GitHub's internal repositories.

Yesterday we detected and contained a compromise of an employee device involving a poisoned VS Code extension. We removed the malicious extension version,…

— GitHub (@github) May 20, 2026

Why this matters for crypto users 

The Mini Shai-Hulud malware family at the center of this campaign is, in functional terms, a broad credential stealer (including GitHub tokens, cloud keys, and local files) that happens to enter through the developer supply chain — with direct implications for crypto because many developers store wallet-related secrets on the same machines.  

Every recent variant analyzed by Wiz, JFrog Security Research, SafeDep, Aikido Security, and SlowMist includes a credential-harvesting module that specifically targets:  

  • Developer credentials and local files that frequently include crypto wallet files and seed phrases on developer machines (e.g., MetaMask vaults, hardware wallet configs, hot wallet keystores — as seen in prior Shai-Hulud waves and consistent with the malware’s >90-file scanner)  
  • Password-manager databases, including Bitwarden, 1Password, pass, and gopass, with the May 19 durabletask variant adding active unlock attempts using scraped environment variables and shell history
  • GitHub Personal Access Tokens and OIDC tokens, which can be used to push malicious code into a project that thousands of downstream users (including crypto firms) install 
  • AWS IAM keys, Kubernetes service-account tokens, and HashiCorp Vault tokens; the building blocks of any crypto firm’s production infrastructure

The crypto industry runs on these developer tools. Major DeFi protocols, exchanges, custodians, wallet providers, and stablecoin issuers depend on npm packages, PyPI libraries, GitHub Actions workflows, and VS Code extensions in their day-to-day engineering. When one of those supply-chain primitives gets compromised, the blast radius reaches directly into the systems that custody user funds. The Bitwarden CLI compromise earlier in 2026, also attributed to TeamPCP, was a textbook case: a developer-tool breach that immediately threatened any crypto user who stored seed phrases or exchange API keys in their vault.

This is also why GitHub-borne phishing has shifted toward crypto bait. The March 2026 OpenClaw $CLAW scam was not coincidentally framed as a crypto airdrop — fake token rewards are a tested social-engineering hook for developers, who are simultaneously high-value (they hold the keys) and statistically more likely than the general public to also be crypto holders.

Supply chain attacks expand beyond GitHub

The incident surfaced as supply chain attacks spread rapidly across software developer ecosystems this month. The “Mini Shai-Hulud” campaign, first identified by security researchers in late April 2026 against the SAP developer ecosystem, has since been documented by multiple security firms including Wiz, JFrog Security Research, SafeDep, Snyk, StepSecurity, Endor Labs, Aikido Security, and SlowMist. It targeted npm and PyPI packages used by developers and companies worldwide.

The campaign has been attributed with high confidence to TeamPCP, a threat actor that Wiz describes as “financially motivated” and “specializing in cloud-native infrastructure compromise.” TeamPCP has now been linked to a string of incidents in 2026: the SAP package compromise (April), Checkmarx (March-April), Bitwarden CLI, PyTorch Lightning, Trivy, LiteLLM, Telnyx, Intercom, the May 11 TanStack/Mistral wave, and the May 19 npm and PyPI waves.

According to SlowMist’s analysis, attackers compromised the npm account “atool” and published 637 malicious package versions across 317 packages within minutes. The firm also said attackers uploaded infected durabletask Python SDK releases while posing as official Microsoft-related updates.

🚨 MistEye TI Alert 🚨

Based on recent intelligence, multiple high-frequency npm packages, including AntV and Echarts-for-react, as well as the durabletask Python SDK, have been compromised by Mini Shai-Hulud supply chain attacks. Notably:

1. May 19, 2026: The npm account atool… pic.twitter.com/MKytsmFiy7

— SlowMist (@SlowMist_Team) May 20, 2026

Researchers warned that the malware immediately searched infected systems for sensitive information. The stolen data reportedly included GitHub tokens, AWS keys, Kubernetes secrets, SSH credentials, and local files stored on developer machines.

SlowMist said investigators now suspect the stolen GitHub credentials may connect to recent attacks involving Grafana Labs repositories. The firm also warned that attackers could move deeper into company infrastructure after gaining access to developer credentials and CI/CD systems.

As a result, security teams now face risks extending beyond individual compromised devices. SlowMist urged organizations to rotate credentials quickly and freeze vulnerable package versions across production systems while investigations continue.

GitHub attacks reflect growing AI-crypto threats

Researchers also linked the latest GitHub incident to a wider wave of phishing and crypto malware attacks targeting software developers. In March, attackers reportedly targeted contributors connected to the OpenClaw AI agent project through fake GitHub issue threads designed to appear legitimate.

The attackers created fake GitHub accounts, opened issues in attacker-controlled repositories, and tagged OpenClaw stargazers with messages claiming they had been selected to receive $5,000 worth of $CLAW tokens. Victims were directed to the cloned domain token-claw[.]xyz — a near-identical replica of openclaw.ai with one addition: a “Connect your wallet” prompt designed to trigger drainer transactions across MetaMask, WalletConnect, and Trust Wallet. The campaign relied on heavily obfuscated JavaScript in a file called eleven.js, with a C2 server and a “nuke” function to clear browser local storage and evade detection.

Notably, OpenClaw founder Peter Steinberger had publicly stated in January 2026, months before the phishing campaign emerged, that the project would never launch a cryptocurrency. “I will never do a coin. Any project that lists me as coin owner is a scam,” Steinberger posted on X at the time. That declaration made the entire $CLAW pitch unambiguously fraudulent from the start.

Security researchers also warned that attackers increasingly combine phishing scams, malicious software packages, and fake software updates in single coordinated campaigns. Many of the attacks spread through trusted developer tools and open-source platforms, making detection more difficult for companies and individual contributors.

In late April 2026, Wiz separately disclosed CVE-2026-3854, a critical remote code execution vulnerability in GitHub’s internal Git infrastructure that exposed millions of public and private repositories. GitHub patched the vulnerability within two hours of internal disclosure. While there is no evidence CVE-2026-3854 was exploited in the wild, the disclosure adds to a pattern of intense security pressure on the platform in 2026.

A previous incident involved a fake GitHub repository posing as a Solana trading bot that contained hidden malware designed to steal wallet credentials. SlowMist later said the software secretly searched local devices for wallet credentials and private keys before sending the stolen information to remote servers controlled by attackers.

The latest GitHub-related breach has renewed concerns about growing risks across developer ecosystems and open-source infrastructure. Security teams will likely watch GitHub’s next disclosures closely as investigators continue tracing the broader scope of the incident.

Also Read: Google, Blackstone AI Push Puts Bitcoin Miners in $90B Power Play

Disclaimer: The information researched and reported by The Crypto Times is for informational purposes only and is not a substitute for professional financial advice. Investing in crypto assets involves significant risk due to market volatility. Always Do Your Own Research (DYOR) and consult with a qualified Financial Advisor before making any investment decisions.

Follow The Crypto Times on Google News to Stay Updated!      Google News
Google News Banner

TAGGED:Cryptocurrency
Share This Article
Whatsapp Whatsapp LinkedIn Telegram Copy Link
Divya Mistry - Content Editor at The Crypto Times
By Divya Mistry
Follow:
Divya Mistry is a Content Editor with over 9 years of experience in news, PR, marketing, and research. Armed with a Master’s Degree in English Literature from the University of Mumbai, she specializes in crafting and refining long-form content across digital and print platforms. Over the years, Divya has contributed to and shaped content for leading brands across a range of industries, including real estate, healthcare, vertical transport, entertainment, lifestyle, education, EdTech, tech, and finance. Her research work has been featured on platforms like DNA India, Forbes, and Elevator World India. She now brings her editorial and research skills to explore the rapidly evolving world of cryptocurrency.

Latest News

Trump-Linked Truth Social Withdraws Bitcoin ETF Plans Amid Fierce Fee Wars
Trump-Linked Truth Social Withdraws Bitcoin ETF Plans Amid Fierce Fee Wars
Pi Network Advances Toward Protocol 23 as Most Mainnet Nodes Upgrade
Pi Network Advances Toward Protocol 23 as Most Mainnet Nodes Upgrade
Trump Orders Fed to Evaluate Direct Payment-Account Access for Crypto Firms
Trump Orders Fed to Evaluate Direct Payment-Account Access for Crypto Firms
Google, Blackstone AI Push Puts Bitcoin Miners in $90B Power Play
Google, Blackstone AI Push Puts Bitcoin Miners in $90B Power Play
HYPE Rises 19% in a Week as Bitwise CIO Calls Hyperliquid a Super App
HYPE Rises 19% in a Week as Bitwise CIO Calls Hyperliquid a Super App

Find Us on Socials

You may also like

Another 382 BTC: Strive Keeps Accelerating Its Bitcoin Bet

Another 382 BTC: Strive Keeps Accelerating Its Bitcoin Bet

Estonia Puts Zondacrypto on Notice With Partial License Freeze

Estonia Puts Zondacrypto on Notice With Partial License Freeze

India Cracks Down on ₹226 Cr Crypto Terror Syndicate Tied to Hamas Channels

India Cracks Down on ₹226 Cr Crypto Terror Syndicate Tied to Hamas Channels

Echo Protocol Secures Systems After $816K eBTC Mint Exploit

Echo Protocol Secures Systems After $816K eBTC Mint Exploit

The Crypto Times Logo PNG

Providing real-time, accurate Crypto reporting. Your trusted source for Crypto News and Research.

Stay Updated

All News
Exclusive
Opinions
Learn
Podcasts

Company

About Us
Our Authors
Editorial Policy
AI Policy
Advertorial Policy

Get In Touch

Contact Us
Career

Find Us on Socials

X-twitter Linkedin Telegram Youtube Instagram

© 2026 The Crypto Times | A BITROCK TECHNOLOGIES L.L.C. Company.

DMCA.com Protection Status
  • Terms and Conditions
  • Disclaimer
  • Privacy Policy
  • Cookie policy
Do Not Sell or Share My Personal Information