Learn from ESLint / npm
When Open Source Turns Against You:
The ESLint Supply-Chain Attack
In 2018, a compromised npm account injected malicious code into ESLint, stealing npm tokens from unsuspecting developers. This supply-chain attack highlighted the fragility of open-source ecosystems. Incident Drill helps your team prepare for and respond to similar threats.
WHY TEAMS PRACTICE THIS
Master Supply-Chain Incident Response
- ✓ Identify and contain supply-chain attacks faster
- ✓ Reduce the impact of security breaches
- ✓ Improve team communication and coordination
- ✓ Strengthen your overall security posture
- ✓ Meet compliance requirements
- ✓ Build a culture of security awareness
How It Works
1
Step 1: Detection
Identify anomalies in package dependencies and network traffic.
2
Step 2: Containment
Isolate affected systems and prevent further token exfiltration.
3
Step 3: Remediation
Remove malicious packages and revoke compromised tokens.
4
Step 4: Analysis
Determine the root cause and implement preventative measures.
EXPLORE MORE
Related Incidents
Be Prepared. Join the Incident Drill Waitlist.
Don't wait for the next supply-chain attack to strike. Sign up for Incident Drill and start training your team today.
Get Early Access →
✓ Founding client discounts
✓ Shape the roadmap
✓ Direct founder support