Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Exploit Cline’s npm Token for 8 Hours

Hackers Exploit Cline’s npm Token for 8 Hours

Posted on February 19, 2026 By CWS

The Cline command-line interface (CLI), a widely-used artificial intelligence development tool, faced a serious security breach on February 17, 2026. Hackers managed to gain access to its npm token, leading to a compromised version being available for approximately eight hours. This incident underscores the increasing threat of supply chain attacks aimed at developer ecosystems.

Details of the Security Breach

At 3:26 AM PT, attackers used a stolen npm publish token to upload a malicious version of the Cline CLI, labeled [email protected], to the npm registry. This version targeted developers utilizing popular development environments like Visual Studio Code and JetBrains. The infiltration involved altering the package.json file to include a postinstall script that would execute npm install -g openclaw@latest during installation.

The rest of the package, including the main CLI executable (dist/cli.mjs), was unchanged from the authentic version, [email protected]. Despite the non-malicious nature of OpenCLAW, its unauthorized installation highlighted potential risks for more dangerous payloads in future attacks.

Response and Mitigation

The Cline development team quickly identified the compromised release, releasing a corrected version, [email protected], by 11:23 AM PT. Shortly thereafter, the compromised version 2.3.0 was deprecated, approximately eight hours after the unauthorized upload. The compromised token has been revoked, and Cline has transitioned its npm publishing to OIDC provenance using GitHub Actions to enhance security for future releases.

It is important to note that the Cline VS Code extension and JetBrains plugin were not affected by this security breach.

Recommendations for Developers

Developers who installed [email protected] during the affected period are advised to update to the latest version using cline update or npm install -g cline@latest, and verify the update with cline –version. In cases where OpenCLAW was unintentionally installed, it can be removed using npm uninstall -g openclaw.

Organizations relying on AI developer tools should conduct audits of their installed CLI tools and enforce strict token management practices across all package registries to prevent similar incidents.

For ongoing updates on cybersecurity, follow us on Google News, LinkedIn, and X. Contact us to share your stories.

Cyber Security News Tags:AI coding assistant, Cline, Cybersecurity, developer tools, JetBrains, npm registry, npm token, OpenClaw, supply chain attack, VS Code

Post navigation

Previous Post: Venice Security Secures $33M for Access Management
Next Post: AI’s Impact on Cybersecurity Response Times

Related Posts

71,000+ WatchGuard Devices Vulnerable to Remote Code Execution Attacks 71,000+ WatchGuard Devices Vulnerable to Remote Code Execution Attacks Cyber Security News
PoC Exploit Released for ImageMagick RCE Vulnerability PoC Exploit Released for ImageMagick RCE Vulnerability Cyber Security News
New Spear-Phishing Attack Abusing Google Ads to Deliver EndRAT Malware New Spear-Phishing Attack Abusing Google Ads to Deliver EndRAT Malware Cyber Security News
Zoomcar Hacked – 8.4 Million Users Sensitive Details Exposed Zoomcar Hacked – 8.4 Million Users Sensitive Details Exposed Cyber Security News
Threat Actor Installed EDR on Their Systems, Revealing Workflows and Tools Used Threat Actor Installed EDR on Their Systems, Revealing Workflows and Tools Used Cyber Security News
RainyDay, Turian and Naikon Malwares Abuse DLL Search Order to Execute Malicious Loaders RainyDay, Turian and Naikon Malwares Abuse DLL Search Order to Execute Malicious Loaders Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • OpenSSL Vulnerabilities and Emerging Cyber Threats
  • Hackers Use Emoji Code to Evade Security Systems
  • Ivanti Vulnerabilities Exploited in Recent Cyber Attacks
  • XWorm Malware Targets Latin American Businesses
  • Figure Tech Data Breach Exposes 1 Million User Records

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • OpenSSL Vulnerabilities and Emerging Cyber Threats
  • Hackers Use Emoji Code to Evade Security Systems
  • Ivanti Vulnerabilities Exploited in Recent Cyber Attacks
  • XWorm Malware Targets Latin American Businesses
  • Figure Tech Data Breach Exposes 1 Million User Records

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News