Snyk has reported that there have been attempts or successful attacks targeting this vulnerability.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsAvoid using all malicious instances of the @cap-js/db-service package.
@cap-js/db-service is a CDS base database service
Affected versions of this package are vulnerable to Embedded Malicious Code that conceals an obfuscated payload designed to steal developer credentials during the package installation. The malicious versions and their contents are actively being removed from the official package manager.
The attack relies on a pre-install script (node setup.mjs) that triggers an 11.6 MB heavily obfuscated script (execution.js) during package installation. Once executed on a developer's machine, the malware steals the developer's credentials and weaponizes them to automatically create public GitHub repositories under the victim's account. These auto-generated repositories carry the hardcoded description "A Mini Shai-Hulud has Appeared" and serve as a live data exfiltration channel.