Malware

Bitwarden CLI npm Package Compromised in Sophisticated GitHub Actions Supply Chain Attack

dark6 28 April 2026
Read Time:3 Minute, 20 Second

Security researchers at Socket have confirmed that @bitwarden/cli version 2026.4.0, the official command-line interface package for the popular Bitwarden password manager, was compromised as part of an ongoing supply chain campaign linked to the Checkmarx malware ecosystem. The compromise exposes millions of users and thousands of enterprise organizations that rely on Bitwarden CLI in their CI/CD pipelines to the risk of credential theft and CI/CD pipeline infiltration.

How the Attack Was Executed

The attackers exploited a vulnerability in Bitwarden’s CI/CD pipeline, specifically targeting a GitHub Actions workflow used in the Bitwarden CLI build process. By compromising or injecting a malicious GitHub Action, the threat actors were able to insert a rogue file named bw1.js into the published npm package contents — content that was not present in the legitimate source code repository.

This attack vector — abusing GitHub Actions as a mechanism for publishing tampered packages to npm — is the same supply chain vector identified by Socket researchers in the broader Checkmarx supply chain campaign. The technique is particularly dangerous because it bypasses source code integrity checks: the npm package’s content differs from the source repository, yet the package is signed and published through legitimate infrastructure, lending it a veneer of authenticity.

What the Malicious Code Does

The injected bw1.js file functions as a staged loader, establishing contact with attacker-controlled infrastructure and exfiltrating credentials and environment variables accessible within the compromised environment. Because Bitwarden CLI is frequently used in automated workflows to retrieve vault secrets for use in build pipelines, a compromised instance has access to an exceptionally high-value set of credentials — potentially including cloud provider API keys, database connection strings, and deployment secrets.

Researchers noted that while the attack is linked to the broader Checkmarx malware ecosystem, several indicators suggest a distinct or evolved threat actor, including ideological branding references in repository commit messages and explicit naming conventions echoing “Shai-Hulud: The Third Coming.”

Scope of Impact

The Bitwarden CLI npm package is widely used across enterprise environments, particularly in DevOps and platform engineering contexts where automated secret retrieval is a routine part of the deployment pipeline. Organizations that installed version 2026.4.0 — even briefly — should treat this as a full credential exposure event and initiate immediate incident response procedures.

  • Remove the compromised package from all developer systems and build environments immediately
  • Rotate all credentials and secrets that may have been accessible in environments where the compromised package was installed
  • Review CI/CD logs for evidence of bw1.js execution or outbound connections to audit.checkmarx[.]cx or unusual Bun runtime activity
  • Audit GitHub Actions workflows for unauthorized modifications or the introduction of third-party actions not previously present
  • Implement short-lived credentials and ensure token scopes are strictly limited to the minimum required permissions

Hardening GitHub Actions Against Supply Chain Attacks

This incident highlights the systemic risk posed by the widespread use of third-party GitHub Actions in CI/CD pipelines. Key hardening recommendations include:

  • Pin GitHub Actions to specific commit SHAs rather than mutable version tags, preventing attackers from pushing malicious updates to a tagged release
  • Implement OIDC-based authentication for cloud provider access instead of long-lived static credentials
  • Restrict npm publish permissions using granular token scopes and require two-factor authentication for package publishing accounts
  • Enable npm package provenance verification where available, and monitor for unexpected package content changes using integrity checking tools

The Expanding Checkmarx Campaign

The Checkmarx supply chain campaign has claimed multiple high-profile victims in 2026, including the Checkmarx KICS Docker Hub repository and the Telnyx PyPI package, which had over 742,000 downloads. The repeated compromise of developer infrastructure indicates a well-resourced and persistent threat actor with a deep understanding of CI/CD security gaps across the open-source ecosystem.

Security teams should treat any software that touches their build pipelines with the same scrutiny applied to production software, and implement continuous monitoring of third-party package integrity as a standard security control.

Source: Cyber Security News

Leave a Reply

💬 [[ unisciti alla discussione! ]]


Se vuoi commentare su Bitwarden CLI npm Package Compromised in Sophisticated GitHub Actions Supply Chain Attack, utilizza la discussione sul Forum.
Condividi esempi, IOCs o tecniche di detection efficaci nel nostro 👉 forum community