Executive Summary
Mini Shai-Hulud is a cross-ecosystem supply-chain campaign that uses package-triggered execution to reach credential-rich developer and CI/CD environments.
Technical teardown of Mini Shai-Hulud, including package-triggered execution, Bun-mediated payload behavior, developer-tool persistence, and defender hunts.
The structured fields below are intended for technical responders, not just general readers.
Mini Shai-Hulud is a cross-ecosystem supply-chain campaign that uses package-triggered execution to reach credential-rich developer and CI/CD environments.
The campaign is technically notable because npm and PyPI entry points converge into a shared JavaScript-oriented payload path and then pivot into developer tooling persistence.
Developer workstations, CI runners, package publishing credentials, GitHub tokens, cloud credentials, AI-tool configuration, and local workspace files are all in scope.
Active in the wild with confirmed compromised package versions.
Inventory the listed package coordinates, hunt for payload filenames and workspace persistence paths, and rotate credentials exposed to affected environments.
Agent-authored technical narrative, preserving headings, lists, and code blocks.
Mini Shai-Hulud is a cross-ecosystem package compromise that targets dependency resolution and import paths rather than waiting for normal application logic. The important technical pattern is that npm and PyPI exposure both lead toward attacker-controlled JavaScript payload behavior in developer and CI/CD environments.
.claude/settings.json and .vscode/tasks.json as persistence-oriented targets.The public evidence for this incident is strongest around artifact names and execution surfaces rather than a complete published malware body. The artifact names below are useful because they anchor hunts for the JavaScript payload stage without giving a runnable implant.
execution.js
router_runtime.js
Package coordinates are rendered in the IOC section once, grouped by ecosystem, so responders can search lockfiles and package caches without repeating the same data throughout the report.
The payload behavior reported by the sources focuses on credential theft and follow-on access. The likely exposure set includes package tokens, GitHub credentials, cloud credentials, local workspace configuration, and CI/CD secrets available to the process that resolved or imported the compromised dependency.
rg -n "mbt@1.2.48|@cap-js/db-service@2.10.1|@cap-js/postgres@2.2.2|@cap-js/sqlite@2.2.2|intercom-client@7.0.4|lightning==2.6.2|lightning==2.6.3" package-lock.json pnpm-lock.yaml yarn.lock requirements*.txt pyproject.toml
rg -n "execution.js|router_runtime.js|A Mini Shai-Hulud has Appeared|.claude/settings.json|.vscode/tasks.json" .
The exact exfiltration transport and complete malware source are not fully represented in the public sources used for this packet. The analysis therefore treats the package-trigger, Bun-mediated payload path, artifact names, and persistence targets as high-confidence, while avoiding unsupported claims about unobserved internal functions.
Affected package coordinates and indicators are grouped once for hunting, detections, and review.
intercom-client@7.0.4
@cap-js/db-service@2.10.1
@cap-js/postgres@2.2.2
@cap-js/sqlite@2.2.2
mbt@1.2.48 intercom-client@7.0.4
@cap-js/db-service@2.10.1
@cap-js/postgres@2.2.2
@cap-js/sqlite@2.2.2
mbt@1.2.48 intercom-client@7.0.4
@cap-js/db-service@2.10.1
@cap-js/postgres@2.2.2
@cap-js/sqlite@2.2.2
mbt@1.2.48 intercom-client@7.0.4
@cap-js/db-service@2.10.1
@cap-js/postgres@2.2.2
@cap-js/sqlite@2.2.2
mbt@1.2.48 lightning==2.6.2
lightning==2.6.3 lightning==2.6.2
lightning==2.6.3 lightning==2.6.2
lightning==2.6.3 execution.js
router_runtime.js .claude/settings.json
.vscode/tasks.json A Mini Shai-Hulud has Appeared. Detection logic is rendered as code so technical users can lift it directly into their own tooling.
rg -n "mbt@1.2.48|@cap-js/db-service@2.10.1|@cap-js/postgres@2.2.2|@cap-js/sqlite@2.2.2|intercom-client@7.0.4|lightning==2.6.2|lightning==2.6.3|execution.js|router_runtime.js" package-lock.json pnpm-lock.yaml yarn.lock requirements*.txt pyproject.toml . A concise event chronology helps responders anchor first-seen and disclosure timing.
Sources documented Mini Shai-Hulud as a cross-ecosystem package compromise.
V2 pipeline normalized source findings and editor-approved a narrative technical teardown.
Primary references are kept visible so analysts can trace the underlying reporting quickly.
Primary campaign tracking page with affected packages, payload behavior, and ongoing activity dates.
Kodem Security - Mini Shai-Hulud cross-ecosystem analysis May 12, 2026, 12:00 AMIndependent technical writeup describing automatic execution, Bun-mediated payload delivery, credential theft, and propagation.