npm skill drops postinstall script that exfiltrates ~/.npmrc
Summary
Skills distributed as npm packages that include a postinstall script reading ~/.npmrc and sending the npm auth token to a pinned webhook. The skill.json declared no network scope; exfiltration happens entirely inside the postinstall lifecycle hook, outside the agent's observation.
Severity & confidence
Critical
Active exploitation in the wild, high blast radius, or direct data exfiltration vector. Treat as an urgent remediation target; quarantine affected artifacts immediately.
Confirmed
Observed directly by Jiffy scanners or validated by multiple independent sources. Indicators are reliable enough to drive automated action.
Indicators
Observed patterns and artifacts associated with this entry. Each indicator can be copied into your detection stack or SIEM.
(?i)postinstall.{0,200}(?:cat|read).{0,120}\.npmrc
https?://[a-z0-9.-]+(?:\.ngrok|\.vercel\.app|requestbin)
Detection rule
A YARA-style pseudo-rule auto-generated from the indicators above. Useful as a starting point — adapt the syntax for your target detection platform.
rule jiffy_ti_2026_000012
{
meta:
source = "jiffy-intel"
severity = "critical"
description = "Auto-generated from Jiffy Intel indicators"
strings:
$command_pattern_0 = "(?i)postinstall.{0,200}(?:cat|read).{0,120}\\.npmrc"
$endpoint_1 = "https?://[a-z0-9.-]+(?:\\.ngrok|\\.vercel\\.app|requestbin)"
condition:
$command_pattern_0 or $endpoint_1
}Auto-generated from the indicators above. Adapt syntax for your detection stack before deploying.
Affected tools
| Tool | Versions | Status |
|---|---|---|
| Claude Code | * | vulnerable |
| Cursor | * | vulnerable |
Example artifacts
Sanitized examples of artifacts Jiffy has observed exhibiting this pattern. Publisher handles are redacted; version ranges and status reflect the most recent scan.
- nx-optimize-skillSkillRemoved
- turbo-helpers-skillSkillRemoved
- monorepo-setup-skillSkillUnder review
Maintainer notified.
How to remediate
- 01Disable npm install scripts globally (`npm config set ignore-scripts true`) for agent-installed packages.
- 02Review ~/.npmrc for tokens that may be compromised and rotate them.
Timeline & sources
Timeline
- First observedFeb 21, 20261 month ago
- Last updatedApr 10, 20267 days ago
- PublishedMar 8, 20261 month ago
Sources
References
Jiffy Research — The AI Artifact Supply Chain
https://blog.jiffylabs.ai/posts/the-ai-artifact-supply-chainOWASP LLM-03: Supply Chain (2026)
https://genai.owasp.org/llmrisk/llm-03-2026/MITRE ATT&CK T1195 — Supply Chain Compromise
https://attack.mitre.org/techniques/T1195/Scan for patterns like this
Point Jiffy at your GitHub org, IDE config, or a single artifact. Get a scored report in under a minute.
Start a free scan