Original Article Text

Click to Toggle View

GitHub tightens npm security with mandatory 2FA, access tokens. GitHub is introducing a set of defenses against supply-chain attacks on the platform that led to multiple large-scale incidents recently. Notable cyberattacks that started from compromising GitHub repositories and then spread to NPM include the "s1ngularity" attack in late August, the "GhostAction" campaign in early September, and the worm-style campaign dubbed "Shai-Hulud" from last week. The attacks led to the compromise of thousands of accounts and private repositories, the theft of sensitive data, and significant remediation costs. Although GitHub responded quickly to minimize the impact of these incidents, the developer platform admits that stronger proactive measures would be more effective. To reduce these risks, GitHub announced that it would gradually implement the following measures: Trusted publishing, already adopted across multiple ecosystems, is strongly encouraged as it eliminates the need to manage API tokens in build systems. NPM maintainers are advised to switch to trusted publishing immediately, as well as to enforce 2FA for publishing and writing, and use WebAuth instead of time-based one-time passwords (TOTP) for 2FA. The code hosting and collaboration platform will roll out these changes gradually and provide the necessary documentation and migration guides to minimize disruption to existing workflows. The announcement also stresses that ecosystem security is a collective duty, and developers are expected to take action themselves to mitigate supply-chain risks by adopting the better security options available on the platform. Ruby Central also announced tighter governance of the RubyGems package manager to improve its supply-chain protections. This ecosystem also suffered from similar problems recently, like a campaign with 60 malicious Ruby gems that were downloaded 275,000 times, and another one typosquating the Fastlane project for Telegram.  Until the new governance model and underlying policies are finalized, only Ruby Central staff will hold admin access. The announcement promises a shift to a more transparent, community-centered model.  A Q&A scheduled for later today is expected to clear concerns related to the sudden action, which many Ruby community members characterized as a crude takeover. Picus Blue Report 2025 is Here: 2X increase in password cracking 46% of environments had passwords cracked, nearly doubling from 25% last year. Get the Picus Blue Report 2025 now for a comprehensive look at more findings on prevention, detection, and data exfiltration trends.

Daily Brief Summary

VULNERABILITIES // GitHub Enhances Security with Mandatory 2FA and Access Tokens

GitHub is implementing new security measures, including mandatory two-factor authentication (2FA) and access tokens, to combat recent supply-chain attacks affecting npm repositories.

Recent attacks such as "s1ngularity," "GhostAction," and "Shai-Hulud" compromised thousands of accounts and repositories, leading to data theft and high remediation costs.

The platform's new strategy includes trusted publishing to eliminate the need for managing API tokens in build systems, enhancing security for npm maintainers.

Developers are encouraged to adopt these security measures, with GitHub providing documentation and migration guides to ensure a smooth transition and minimize workflow disruptions.

Ruby Central is also tightening governance over RubyGems, limiting admin access to staff until new policies are in place, following similar supply-chain security challenges.

These changes reflect a broader push for community involvement in strengthening ecosystem security and mitigating risks associated with software supply chains.