← Back to context Comment by tkel 4 hours ago If you look at the last N npm worms, they all used postinstall scripts. 4 comments tkel Reply cluckindan 4 hours ago Is that even true? tkel 4 hours ago shai-hulud and variantshttps://www.stepsecurity.io/blog/mini-shai-hulud-is-back-a-s... cluckindan 4 hours ago So N=1? 2? 3? 1 reply →
cluckindan 4 hours ago Is that even true? tkel 4 hours ago shai-hulud and variantshttps://www.stepsecurity.io/blog/mini-shai-hulud-is-back-a-s... cluckindan 4 hours ago So N=1? 2? 3? 1 reply →
tkel 4 hours ago shai-hulud and variantshttps://www.stepsecurity.io/blog/mini-shai-hulud-is-back-a-s... cluckindan 4 hours ago So N=1? 2? 3? 1 reply →
Is that even true?
shai-hulud and variants
https://www.stepsecurity.io/blog/mini-shai-hulud-is-back-a-s...
So N=1? 2? 3?
1 reply →