GitHub Internal Repo Breach Linked to Compromised Nx Console VS Code Extension
Details on how a compromised Nx Console VS Code extension led to the exfiltration of 3,800 GitHub internal repositories, plus mitigation steps.

TL;DR
GitHub confirmed that an employee’s workstation was compromised via a trojanized Nx Console VS Code extension, allowing threat actor TeamPCP to exfiltrate roughly 3,800 internal repositories. The malicious extension was live on the Visual Studio Marketplace for only 18 minutes on May 18 2026.
Context
The breach originated when a developer’s account for the nrwl/angular‑console extension was hijacked, likely in the wake of the TanStack supply‑chain incident. Attackers published a poisoned version of the extension that appeared legitimate but executed a hidden shell command on startup, downloading a credential‑stealer from a planted commit in the official nrwl/nx repository.
Key Facts
- The trojanized extension was available from 12:30 p.m. to 12:48 p.m. UTC on May 18 2026, a window of 18 minutes. - TeamPCP used the stolen credentials to harvest data from 1Password vaults, Anthropic Claude Code configurations, npm, GitHub, and AWS accounts. - Approximately 3,800 GitHub internal repositories were exfiltrated; some contained customer support excerpts. - GitHub’s CISO stated there is no evidence of impact to customer‑owned repositories outside the internal set, and affected secrets have been rotated.
What It Means
The incident shows how a brief window in a trusted extension marketplace can lead to large‑scale credential theft when auto‑update is enabled. It underscores the risk of relying on publisher reputation without additional verification, especially for widely used developer tooling.
Mitigations
- Disable automatic updates for VS Code extensions or enforce strict version pinning in enterprise environments. - Require multi‑factor authentication and least‑privilege access for extension publisher accounts. - Monitor the Visual Studio Marketplace for unexpected version bumps and verify publisher signatures before deployment. - Deploy endpoint detection and response (EDR) rules that flag execution of unknown shell commands from extension startup scripts. - Rotate any secrets that may have been exposed, including API keys, tokens, and service accounts used by developers. - Implement software bill of materials (SBOM) checks for extensions and enforce policy‑based approval for new or updated extensions.
Organizations should watch for follow‑on activity from TeamPCP, particularly attempts to reuse stolen credentials in other supply‑chain targets, and monitor threat‑intel feeds for indicators tied to the nrwl/nx commit used in this attack.
Continue reading
More in this thread
Erie Family Health Centers Under Investigation for 570,000‑Record Data Breach That Was Not Reported
Peter Olaleru
DataDome Launches Intent‑Aware Virtual Queue to Separate Trusted AI Shoppers from Bots
Peter Olaleru
DataDome Launches AI-Focused Virtual Queue to Prioritize Trusted Agents
Peter Olaleru
Conversation
Reader notes
Loading comments...