Snyk has reported that there have been attempts or successful attacks targeting this vulnerability.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsAvoid using all malicious instances of the intercom-client package.
Affected versions of this package are vulnerable to Embedded Malicious Code that conceals a credential-stealing payload. A malicious actor compromised the package, enabling the attacker to publish tampered versions of the deep learning framework.
The execution chain runs automatically on module import through a daemon thread with suppressed output. A preinstall script is added that downloads the Bun JavaScript runtime from GitHub to execute an 11 MB obfuscated JavaScript payload (router_runtime.js). The malware actively steals and exfiltrates developer tokens, environment variables, and cloud-related secrets.