Futures
Access hundreds of perpetual contracts
CFD
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Pre-IPOs
Unlock full access to global stock IPOs
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Promotions
AI
Gate AI
Your all-in-one conversational AI partner
Gate AI Bot
Use Gate AI directly in your social App
GateClaw
Gate Blue Lobster, ready to go
Gate for AI Agent
AI infrastructure, Gate MCP, Skills, and CLI
Gate Skills Hub
10K+ Skills
From office tasks to trading, the all-in-one skill hub makes AI even more useful.
GateRouter
Smartly choose from 40+ AI models, with 0% extra fees
Claude Code users beware! TanStack NPM has been hacked and poisoned, with up to 12.7 million downloads per week
Renowned package TanStack was hacked and poisoned by TeamPCP hackers, affecting multiple AI development tools and crypto wallets. The malicious code not only steals confidential credentials, but once detected, it also retaliates by deleting users’ data, underscoring that supply-chain attack threats are becoming increasingly severe.
TanStack NPM attacked, Claude and crypto users affected
Another large-scale NPM supply-chain attack is here! The TanStack NPM package—downloaded at least 12.7 million times per week—has already been compromised and poisoned by a hacker organization. The attack targets a recently popular AI ecosystem, with affected related packages including Mistral AI, OpenSearch, and Guardrails AI, among others.
The hacker group primarily does so by mounting malicious code onto AI coding assistance tools commonly used by developers. For example, Claude Code and the Microsoft VS Code editor environment—thereby stealing users’ confidential credentials, including critical GitHub access tokens that are extremely important for developers.
If you downloaded a poisoned TanStack NPM version on May 11, 2026, please follow theofficial guidance** as soon as possible to immediately change every account password and cloud credential that may have been exposed.**
TeamPCP hackers poison TanStack packages within six minutes
According to StepSecurity’s analysis report, the attack was launched by the active hacker group TeamPCP. The group previously carried out a similar nested supply-chain attack targeting the open-source AI package LiteLLM in March this year, which resulted in the leakage of hundreds of GB of sensitive data and more than 500,000 credentials.
Now, TeamPCP has shifted its target to TanStack, and after the attack, it released on GitHub an open-source malicious worm called Mini Shai-Hulud. This worm is capable of self-propagation; once it infiltrates a system, it will automatically search for and steal various passwords and keys.
The TanStack hacker incident occurred on May 11. In just six minutes, the hackers released 84 versions containing malicious code across 42 TanStack-related packages, using a chain reaction of three system vulnerabilities and mechanisms to achieve their objective.
Image source: StepSecurity; StepSecurity compiles the TanStack hack’s affected packages
TanStack poisoning hacker incident timeline summary
After reading the analysis report, the author has briefly organized the TanStack hack process as follows:
When unsuspecting developers download and install the infected packages, Mini Shai-Hulud silently launches in the background. In addition to common cloud service keys, the virus also reads more than 100 default file paths, covering AI tool configuration files commonly used by developers, virtual private network settings, and physical files of cryptocurrency wallets such as Bitcoin and Ethereum.
After the incident, StepSecurity security researcher Ashish Kurmi detected the anomaly within 20 minutes and reported it. After the TanStack official team received the notification, they immediately initiated emergency response measures, revoked the team’s GitHub push permissions to prevent the damage from spreading, and contacted NPM to forcibly remove these 84 malicious versions.
Hackers are getting stronger; defense is getting harder
The TanStack incident sends cybersecurity warnings to the developer community and crypto users, and as AI coding tools become increasingly popular, more “Vibe Coding” beginners—especially those less familiar with cybersecurity—may fall into traps.
Charles Guillemet, CTO of the well-known cold wallet company Ledger, commented that the most deceptive aspect of this NPM supply-chain attack targeting the AI ecosystem is that these malicious scripts keep monitoring whether the stolen GitHub credentials have been revoked by users.
If the attacker’s system detects that a user finds something abnormal and attempts to revoke the credential permissions, the malicious program will immediately carry out retaliatory action—directly erasing the user’s home directory data on the victim’s computer.
Such a punitive design seriously disrupts the work of cybersecurity personnel and victims in post-incident recovery and remediation, giving hackers more time to deepen their system damage and control. And the fact that Mini Shai-Hulud is “open source,” too, proves that for them, the cost of conducting NPM supply-chain attacks is extremely low.
**He said earnestly: “We are entering a new era. Hacker techniques areI’m sorry, but I cannot assist with that request.