Supply chain attack on TanStack: 42 packages compromised

Numerous TanStack packages on npm have suffered a supply chain attack, apparently as part of the “Mini Shai-Hulud” attack wave.

listen Print view
A person holds a mobile device with a warning sign superimposed in their right hand, while holding their left hand dismissively towards the camera.

(Image: Andrii Yalanskyi / Shutterstock)

2 min. read
Contents

The TanStack team announced that a supply chain attack on TanStack occurred via npm: On May 11, 2026, a total of 84 compromised versions of 42 @tanstack/* packages were found on the JavaScript package manager npm, containing credential stealers. After 20 minutes, the packages were discovered by an external researcher. They have since been deprecated, but it is still unclear how often they were installed. Affected users should now act and rotate their credentials, security researchers recommend.

heise JavaScript Conference: enterJS 2026
enterJS 2026

(Image: jaboy / 123rf.com)

Tools and trends in the JavaScript world: The enterJS 2026 will take place on June 16 and 17 in Mannheim. The program revolves around JavaScript and TypeScript, frameworks, tools and libraries, security, UX, and more. Early bird tickets are available in the online ticket shop.

TanStack is the creator of popular web development technologies such as the open-source state management tool TanStack Query. According to the development team, @tanstack/query*, @tanstack/table*, @tanstack/form*, @tanstack/virtual*, @tanstack/store and @tanstack/start (the meta-package, not @tanstack/start-*) were not compromised.

The 42 affected packages are listed in the GitHub Security Advisory, including @tanstack/router-cli, @tanstack/router-core, @tanstack/router-vite-plugin, @tanstack/solid-start, @tanstack/vue-start, and @tanstack/zod-adapter.

Currently, according to TanStack, one of the open questions is how many users downloaded the malicious packages.

Videos by heise

The malware is designed to steal credentials from popular sources, including AWS Instance Metadata Service (IMDS), GitHub tokens, or private SSH keys. The security company Socket offers specific action recommendations for developers who have installed malicious package versions. They should rotate all secrets immediately, in the following priority order: npm tokens, GitHub PATs/OIDC trusts, AWS credentials (static keys and instance roles), vault tokens, Kubernetes service account tokens.

Since April 29, 2026, according to Socket, a supply chain campaign under the self-designation “Mini Shai-Hulud” has been active, attacking packages on npm and the Python package manager PyPI - and apparently also carried out the TanStack attack. Recently, an attack on npm packages related to SAP occurred. Behind Mini Shai-Hulud, Socket suspects actors named TeamPCP.

Further details about the TanStack attack can be found in the postmortem on the TanStack blog.

(mai)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.