2026-02-02 — NPM package c11dff444 flagged as malware (GHSA-cpcr-74hm-pg3c)¶
Summary¶
GitHub has published a malware advisory for the NPM package c11dff444.
“Any computer that has this package installed or running should be considered fully compromised.”
- Advisory: https://github.com/advisories/GHSA-cpcr-74hm-pg3c
- Ecosystem: npm
- Affected versions:
>= 0 - Patched versions: none
What to do (durable guidance)¶
If you find c11dff444 installed anywhere (directly or as a transitive dependency), treat it as an incident.
Immediate actions¶
- Contain
- Stop affected workloads (CI runner, dev machine, container, server).
-
Preserve evidence (process list, network connections, install logs, lockfiles).
-
Identify exposure
- Search across:
package.jsonpackage-lock.json/yarn.lock/pnpm-lock.yaml- build images and caches
-
Check whether it could have executed install hooks (
preinstall/install/postinstall). -
Rotate secrets from a clean machine
-
CI tokens, cloud credentials, SSH keys, registry tokens, app secrets.
-
Rebuild clean
- Prefer re-imaging (don’t rely on “remove the package” as remediation).
Longer-term hardening¶
- Use lockfiles and keep them under review.
- Prefer ephemeral CI runners; avoid shared caches for sensitive steps.
- Consider
npm --ignore-scriptswhere feasible. - Generate SBOMs and scan/attest builds.