<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet href="https://rss.buzzsprout.com/styles.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:psc="http://podlove.org/simple-chapters" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
  <atom:link href="https://rss.buzzsprout.com/2613368.rss" rel="self" type="application/rss+xml" />
  <atom:link href="https://pubsubhubbub.appspot.com/" rel="hub" xmlns="http://www.w3.org/2005/Atom" />
  <title>The OpenSourceMalware Show</title>

  <lastBuildDate>Fri, 01 May 2026 09:28:19 -0700</lastBuildDate>
  <link>https://podcast.opensourcemalware.com</link>
  <language>en-us</language>
  <copyright>© 2026 The OpenSourceMalware Show</copyright>
  <podcast:locked>yes</podcast:locked>
    <podcast:guid>9002dbb0-45ee-5610-af63-fffcd91fdeb8</podcast:guid>
<podcast:podroll>
    <podcast:remoteItem feedGuid="c181c16c-c3d5-578f-9376-e35c057c82f9" feedUrl="https://opensourcesecuritypodcast.libsyn.com/rss" />
    <podcast:remoteItem feedGuid="d461ed53-e388-53e9-ba93-8a97f50d26f6" feedUrl="https://anchor.fm/s/10e1875a4/podcast/rss" />
    <podcast:remoteItem feedGuid="a1b7f642-b609-5df5-aebd-6ed4f9875119" feedUrl="https://absoluteappsec.com/rss.xml" />
    <podcast:remoteItem feedGuid="59ce6f1d-aa91-5f60-a637-c7ab3f2c0bad" feedUrl="https://anchor.fm/s/10aa9a190/podcast/rss" />
    <podcast:remoteItem feedGuid="cbc34855-d47f-57d5-8b7d-3d69c1bccb75" feedUrl="https://anchor.fm/s/108504a34/podcast/rss" />
  </podcast:podroll>
  <itunes:author>OpenSourceMalware</itunes:author>
  <itunes:type>episodic</itunes:type>
  <itunes:explicit>false</itunes:explicit>
  <description><![CDATA[<p>When you think about malware, you probably envision phishing emails or sketchy websites. But malicious open source - targeting software developers and their build systems - is becoming a top way that threat actors deliver malware. Just one 'npm install' can trigger payloads that steal information and credentials. Software supply chain attacks by state actors, ransomware groups, and freelancers are happening every day.</p><p><br></p><p>Hosted by Jenn Gile and Paul McCarty (co-founders of OpenSourceMalware), this podcast explores the latest trends and attacks, and helps defenders understand the tactics needed to prevent their orgs from being the next target.</p><p><br></p><p>OpenSourceMalware provides community-driven threat intelligence on malicious open source assets including packages, domains, IP addresses, crypto wallets, and more.</p><p><br></p><p>https://opensourcemalware.com/</p>]]></description>
  <generator>Buzzsprout (https://www.buzzsprout.com)</generator>
  <itunes:keywords>malware, software development, software supply chain attacks</itunes:keywords>
  <itunes:owner>
    <itunes:name>OpenSourceMalware</itunes:name>
  </itunes:owner>
  <image>
     <url>https://storage.buzzsprout.com/mhdtgol9oltp0xi26sz99ahbcdhk?.jpg</url>
     <title>The OpenSourceMalware Show</title>
     <link></link>
  </image>
  <itunes:image href="https://storage.buzzsprout.com/mhdtgol9oltp0xi26sz99ahbcdhk?.jpg" />
  <itunes:category text="Technology" />
  <podcast:person role="host" img="https://storage.buzzsprout.com/qmv5vd5trxs3fepuhamk816mug4t">Jenn Gile</podcast:person>
  <podcast:person role="host" img="https://storage.buzzsprout.com/ei1g78s9haadcm3wqe4q6qhllrzv">Paul McCarty</podcast:person>
  <item>
    <itunes:title>#2 - Lovable and Vercel incidents, GitHub RCE, EDR vs. AI agents, Mini Shai Halud by Team PCP</itunes:title>
    <title>#2 - Lovable and Vercel incidents, GitHub RCE, EDR vs. AI agents, Mini Shai Halud by Team PCP</title>
    <itunes:summary><![CDATA[Join OpenSourceMalware co-founders Jenn Gile and Paul McCarty as they cover a week that had defenders everywhere ready to call it on 2026. In this episode, we cover four topics: Lovable and Vercel incident response failures: Two AI-native platforms had significant security incidents in recent weeks, and both initially responded by minimizing the severity. We break down why Lovable's regression exposed source code and full chat history to any free account holder (the mother of all IDORs), why ...]]></itunes:summary>
    <description><![CDATA[<p>Join OpenSourceMalware co-founders Jenn Gile and Paul McCarty as they cover a week that had defenders everywhere ready to call it on 2026.</p><p>In this episode, we cover four topics:</p><ul><li><b>Lovable and Vercel incident response failures:</b> Two AI-native platforms had significant security incidents in recent weeks, and both initially responded by minimizing the severity. We break down why Lovable&apos;s regression exposed source code and full chat history to any free account holder (the mother of all IDORs), why Vercel&apos;s response left paying customers without a single actionable mitigation step, and what good incident response communication actually looks like.</li><li><b>GitHub RCE via git push:</b> A remote code execution vulnerability sitting in GitHub&apos;s codebase for over a decade allowed arbitrary code to be passed and executed via the -o option on a git push. We discuss why this happened, why it is not entirely surprising given Git&apos;s design history, and what it means for the ecosystem.</li><li><b>EDR vs. AI coding agents:</b> Paul&apos;s EDR flagged his own development environment as infected while he was refactoring a library with Claude. We unpack why AI agents operating at non-human speed trigger the same behavioral signatures as ransomware, and why this is going to become a bigger problem as agentic coding workflows become the norm.</li><li><b>Mini Shai Halud by Team PCP:</b> Team PCP&apos;s latest campaign compromised the Lightning Python package (15 million downloads per week) and the Intercom npm client (370,000 downloads per week), among others. We cover what makes this campaign notable: Team PCP has adopted the VS Code tasks file persistence technique previously seen only in DPRK-linked campaigns like TasksJacker and Pollen Rider. We also discuss what over 2,000 exfiltration repositories on GitHub mean for affected developers and organizations, and what you should be doing right now if you are worried you are affected.</li></ul><p>Episode Resources:</p><p><a href='https://opensourcemalware.com/blog/rise-ai-anti-patterns'><b>AI Full-Stack Development: The Anti-Patterns Rise Against Us - Part 1<br/></b></a>Our research on some security anti-patterns we discovered when auditing how AI tools write code</p><p><a href='https://opensourcemalware.com/blog/mini-shai-hulud'><b>Mini Shai-Hulud Borrowed Its Best Trick From PolinRider<br/></b></a>An analysis of the TeamPCP campaign “mini Shai Hulud, including details on the trick they borrowed from North Korean campaigns like PolinRider and Contagious Interview</p><p><a href='https://blog.gitguardian.com/renovate-dependabot-the-new-malware-delivery-system/'><b>Renovate &amp; Dependabot: The New Malware Delivery System<br/></b></a>A GitGuardian blog about the way these tools can accidentally auto-install malware</p>]]></description>
    <content:encoded><![CDATA[<p>Join OpenSourceMalware co-founders Jenn Gile and Paul McCarty as they cover a week that had defenders everywhere ready to call it on 2026.</p><p>In this episode, we cover four topics:</p><ul><li><b>Lovable and Vercel incident response failures:</b> Two AI-native platforms had significant security incidents in recent weeks, and both initially responded by minimizing the severity. We break down why Lovable&apos;s regression exposed source code and full chat history to any free account holder (the mother of all IDORs), why Vercel&apos;s response left paying customers without a single actionable mitigation step, and what good incident response communication actually looks like.</li><li><b>GitHub RCE via git push:</b> A remote code execution vulnerability sitting in GitHub&apos;s codebase for over a decade allowed arbitrary code to be passed and executed via the -o option on a git push. We discuss why this happened, why it is not entirely surprising given Git&apos;s design history, and what it means for the ecosystem.</li><li><b>EDR vs. AI coding agents:</b> Paul&apos;s EDR flagged his own development environment as infected while he was refactoring a library with Claude. We unpack why AI agents operating at non-human speed trigger the same behavioral signatures as ransomware, and why this is going to become a bigger problem as agentic coding workflows become the norm.</li><li><b>Mini Shai Halud by Team PCP:</b> Team PCP&apos;s latest campaign compromised the Lightning Python package (15 million downloads per week) and the Intercom npm client (370,000 downloads per week), among others. We cover what makes this campaign notable: Team PCP has adopted the VS Code tasks file persistence technique previously seen only in DPRK-linked campaigns like TasksJacker and Pollen Rider. We also discuss what over 2,000 exfiltration repositories on GitHub mean for affected developers and organizations, and what you should be doing right now if you are worried you are affected.</li></ul><p>Episode Resources:</p><p><a href='https://opensourcemalware.com/blog/rise-ai-anti-patterns'><b>AI Full-Stack Development: The Anti-Patterns Rise Against Us - Part 1<br/></b></a>Our research on some security anti-patterns we discovered when auditing how AI tools write code</p><p><a href='https://opensourcemalware.com/blog/mini-shai-hulud'><b>Mini Shai-Hulud Borrowed Its Best Trick From PolinRider<br/></b></a>An analysis of the TeamPCP campaign “mini Shai Hulud, including details on the trick they borrowed from North Korean campaigns like PolinRider and Contagious Interview</p><p><a href='https://blog.gitguardian.com/renovate-dependabot-the-new-malware-delivery-system/'><b>Renovate &amp; Dependabot: The New Malware Delivery System<br/></b></a>A GitGuardian blog about the way these tools can accidentally auto-install malware</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2613368/episodes/19105940-2-lovable-and-vercel-incidents-github-rce-edr-vs-ai-agents-mini-shai-halud-by-team-pcp.mp3" length="18509690" type="audio/mpeg" />
    <itunes:author>OpenSourceMalware</itunes:author>
    <guid isPermaLink="false">Buzzsprout-19105940</guid>
    <pubDate>Thu, 30 Apr 2026 15:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2613368/19105940/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2613368/19105940/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2613368/19105940/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2613368/19105940/transcript.vtt" type="text/vtt" />
    <itunes:duration>1540</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>2</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>#1 - Bitwarden CLI compromise, npm lifecycle scripts, OWASP cheat sheet, cross-ecosystem attacks</itunes:title>
    <title>#1 - Bitwarden CLI compromise, npm lifecycle scripts, OWASP cheat sheet, cross-ecosystem attacks</title>
    <itunes:summary><![CDATA[Welcome to the very first episode of The OpenSourceMalware Show! Join OpenSourceMalware co-founders Jenn Gile and Paul McCarty as they break down the latest news, threats, and best practices in the open-source ecosystem.   In this episode, we dive into four major topics: Bitwarden CLI Compromise: We analyze the recently discovered malicious version (2026.4.0) of the Bitwarden CLI package. We break down how this cloud-native infostealer silently executes via pre-install scripts to harvest...]]></itunes:summary>
    <description><![CDATA[<p>Welcome to the very first episode of The OpenSourceMalware Show! Join OpenSourceMalware co-founders Jenn Gile and Paul McCarty as they break down the latest news, threats, and best practices in the open-source ecosystem. <br/><br/>In this episode, we dive into four major topics:</p><ul><li><b>Bitwarden CLI Compromise: </b>We analyze the recently discovered malicious version (2026.4.0) of the Bitwarden CLI package. We break down how this cloud-native infostealer silently executes via pre-install scripts to harvest credentials across AWS, Azure, GCP, and GitHub, as well as hoovering up AI config files like Claude. We also discuss its exfiltration tactics to a lookalike domain and explain why we are skeptical of the threat actor&apos;s claims that this is the &quot;third coming of Shai-Hulud&quot;.</li><li>T<b>he Danger of npm Lifecycle Scripts:</b> Why are pre-install and post-install scripts such a popular attack path? We discuss how threat actors exploit these convenience features to auto-install malware. We also explore the differences between package managers, noting that while these scripts are off by default in tools like pnpm and bun, they remain on by default in npm.</li><li><b>OWASP&apos;s npm Security Cheat Sheet:</b> We review a 12-point cheat sheet from OWASP covering npm security best practices. We share our thoughts on artifact governance, the realities of responsible disclosure, and why falling for dependency confusion or typo squatting attacks relies more on machine automation than just &quot;dummy&quot; human errors. </li><li><b>GenAI and Cross-Ecosystem Attacks:</b> We wrap up with an alarming new trend we observed just this week: threat actors using Generative AI (like Claude) to rapidly translate working malware into different programming languages. This enabled them to deploy malicious packages across multiple ecosystems to target users of a specific company within a coordinated 8-hour window.</li></ul><p><b>Resources:</b></p><ul><li><a href='https://opensourcemalware.com/npm/@bitwarden/cli'>bitwarden/cli threat report</a></li><li><a href='https://cheatsheetseries.owasp.org/cheatsheets/NPM_Security_Cheat_Sheet.html'>NPM security cheat sheet from OWASP</a></li><li><a href='https://opensourcemalware.com/'>Get started</a> with OpenSourceMalware for free</li></ul>]]></description>
    <content:encoded><![CDATA[<p>Welcome to the very first episode of The OpenSourceMalware Show! Join OpenSourceMalware co-founders Jenn Gile and Paul McCarty as they break down the latest news, threats, and best practices in the open-source ecosystem. <br/><br/>In this episode, we dive into four major topics:</p><ul><li><b>Bitwarden CLI Compromise: </b>We analyze the recently discovered malicious version (2026.4.0) of the Bitwarden CLI package. We break down how this cloud-native infostealer silently executes via pre-install scripts to harvest credentials across AWS, Azure, GCP, and GitHub, as well as hoovering up AI config files like Claude. We also discuss its exfiltration tactics to a lookalike domain and explain why we are skeptical of the threat actor&apos;s claims that this is the &quot;third coming of Shai-Hulud&quot;.</li><li>T<b>he Danger of npm Lifecycle Scripts:</b> Why are pre-install and post-install scripts such a popular attack path? We discuss how threat actors exploit these convenience features to auto-install malware. We also explore the differences between package managers, noting that while these scripts are off by default in tools like pnpm and bun, they remain on by default in npm.</li><li><b>OWASP&apos;s npm Security Cheat Sheet:</b> We review a 12-point cheat sheet from OWASP covering npm security best practices. We share our thoughts on artifact governance, the realities of responsible disclosure, and why falling for dependency confusion or typo squatting attacks relies more on machine automation than just &quot;dummy&quot; human errors. </li><li><b>GenAI and Cross-Ecosystem Attacks:</b> We wrap up with an alarming new trend we observed just this week: threat actors using Generative AI (like Claude) to rapidly translate working malware into different programming languages. This enabled them to deploy malicious packages across multiple ecosystems to target users of a specific company within a coordinated 8-hour window.</li></ul><p><b>Resources:</b></p><ul><li><a href='https://opensourcemalware.com/npm/@bitwarden/cli'>bitwarden/cli threat report</a></li><li><a href='https://cheatsheetseries.owasp.org/cheatsheets/NPM_Security_Cheat_Sheet.html'>NPM security cheat sheet from OWASP</a></li><li><a href='https://opensourcemalware.com/'>Get started</a> with OpenSourceMalware for free</li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2613368/episodes/19084194-1-bitwarden-cli-compromise-npm-lifecycle-scripts-owasp-cheat-sheet-cross-ecosystem-attacks.mp3" length="27112881" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/lvmysavlv1c63ardikcqqdmx530q?.jpg" />
    <itunes:author>OpenSourceMalware</itunes:author>
    <guid isPermaLink="false">Buzzsprout-19084194</guid>
    <pubDate>Mon, 27 Apr 2026 09:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2613368/19084194/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2613368/19084194/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2613368/19084194/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2613368/19084194/transcript.vtt" type="text/vtt" />
    <itunes:duration>2256</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>1</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
</channel>
</rss>
