Researchers warn malicious packages can harvest secrets, weaponize CI systems, and spread across projects while carrying a dormant wipe mechanism.
When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.