Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Exploit Cline’s npm Token for 8 Hours

Hackers Exploit Cline’s npm Token for 8 Hours

Posted on February 19, 2026 By CWS

The Cline command-line interface (CLI), a widely-used artificial intelligence development tool, faced a serious security breach on February 17, 2026. Hackers managed to gain access to its npm token, leading to a compromised version being available for approximately eight hours. This incident underscores the increasing threat of supply chain attacks aimed at developer ecosystems.

Details of the Security Breach

At 3:26 AM PT, attackers used a stolen npm publish token to upload a malicious version of the Cline CLI, labeled [email protected], to the npm registry. This version targeted developers utilizing popular development environments like Visual Studio Code and JetBrains. The infiltration involved altering the package.json file to include a postinstall script that would execute npm install -g openclaw@latest during installation.

The rest of the package, including the main CLI executable (dist/cli.mjs), was unchanged from the authentic version, [email protected]. Despite the non-malicious nature of OpenCLAW, its unauthorized installation highlighted potential risks for more dangerous payloads in future attacks.

Response and Mitigation

The Cline development team quickly identified the compromised release, releasing a corrected version, [email protected], by 11:23 AM PT. Shortly thereafter, the compromised version 2.3.0 was deprecated, approximately eight hours after the unauthorized upload. The compromised token has been revoked, and Cline has transitioned its npm publishing to OIDC provenance using GitHub Actions to enhance security for future releases.

It is important to note that the Cline VS Code extension and JetBrains plugin were not affected by this security breach.

Recommendations for Developers

Developers who installed [email protected] during the affected period are advised to update to the latest version using cline update or npm install -g cline@latest, and verify the update with cline –version. In cases where OpenCLAW was unintentionally installed, it can be removed using npm uninstall -g openclaw.

Organizations relying on AI developer tools should conduct audits of their installed CLI tools and enforce strict token management practices across all package registries to prevent similar incidents.

For ongoing updates on cybersecurity, follow us on Google News, LinkedIn, and X. Contact us to share your stories.

Cyber Security News Tags:AI coding assistant, Cline, Cybersecurity, developer tools, JetBrains, npm registry, npm token, OpenClaw, supply chain attack, VS Code

Post navigation

Previous Post: Venice Security Secures $33M for Access Management
Next Post: AI’s Impact on Cybersecurity Response Times

Related Posts

Weaponized LNK File Disguised as Credit Card Security Email Steals User Data Weaponized LNK File Disguised as Credit Card Security Email Steals User Data Cyber Security News
NVIDIA VApp for Windows Vulnerability Let Attackers Execute Malicious Code NVIDIA VApp for Windows Vulnerability Let Attackers Execute Malicious Code Cyber Security News
Windows Accessibility Flaw Allows Stealthy Persistence and Lateral Movement via Narrator DLL Hijack Windows Accessibility Flaw Allows Stealthy Persistence and Lateral Movement via Narrator DLL Hijack Cyber Security News
Attackers Abuse Discord to Deliver Clipboard Hijacker That Steals Wallet Addresses on Paste Attackers Abuse Discord to Deliver Clipboard Hijacker That Steals Wallet Addresses on Paste Cyber Security News
Integrating Threat Intelligence into Security Operations Centers Integrating Threat Intelligence into Security Operations Centers Cyber Security News
Massistant Chinese Mobile Forensic Tooling Gain Access to SMS Messages, Images, Audio and GPS Data Massistant Chinese Mobile Forensic Tooling Gain Access to SMS Messages, Images, Audio and GPS Data Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Authorities Shut Down Criminal VPN in Global Cybercrime Crackdown
  • Google Urges Chrome Update to Block Critical Threats
  • Critical Drupal Security Flaw Threatens Global Websites
  • AI Fuels Surge in Google’s Chrome Vulnerability Discoveries
  • Critical Flaw in Cisco Secure Workload Exposes APIs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Authorities Shut Down Criminal VPN in Global Cybercrime Crackdown
  • Google Urges Chrome Update to Block Critical Threats
  • Critical Drupal Security Flaw Threatens Global Websites
  • AI Fuels Surge in Google’s Chrome Vulnerability Discoveries
  • Critical Flaw in Cisco Secure Workload Exposes APIs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark