BotBeat
...
← Back

> ▌

Mistral AIMistral AI
INDUSTRY REPORTMistral AI2026-05-13

Major Supply Chain Attack Compromises Mistral AI SDK and 170+ Open Source Packages

Key Takeaways

  • ▸Over 170 npm packages and 2 PyPI packages compromised in a single coordinated attack spanning multiple organizations (@tanstack, @uipath, @squawk, @tallyui)
  • ▸Mistral AI's official SDK (mistralai on PyPI and @mistralai/mistralai on npm) was directly compromised, demonstrating vulnerability of even trusted sources
  • ▸Attack used sophisticated credential harvesting, file dropping, and code execution with C2 infrastructure at filev2.getsession.org and git-tanstack.com
Source:
Hacker Newshttps://safedep.io/mass-npm-supply-chain-attack-tanstack-mistral/↗

Summary

A massive coordinated supply chain attack on May 11, 2026 compromised over 170 npm packages and 2 PyPI packages, marking one of the largest registry poisoning events of 2026. The attack specifically targeted Mistral AI's official SDK suite on both npm (@mistralai/mistralai) and PyPI (mistralai), alongside packages from TanStack, UiPath, OpenSearch, and Guardrails AI. The attacker published malicious versions across entire organizational scopes, demonstrating sophisticated coordination and scale rarely seen in single campaigns.

The compromised packages included widely-used libraries like @tanstack/react-router (3M+ weekly downloads), @opensearch-project/opensearch, and UiPath's RPA automation tools. The attack used different payload delivery mechanisms for npm and PyPI: npm packages dropped configuration files and attempted to steal credentials, while PyPI packages included a Python dropper that downloads and executes code from attacker-controlled infrastructure at hxxps://git-tanstack[.]com/transformers.pyz. PyPI has quarantined the entire mistralai and guardrails-ai projects.

The incident underscores critical vulnerabilities in the open source supply chain, where even official SDKs from major companies can be compromised through credential theft or account takeover. Developers are advised to implement strict dependency management policies, use package verification tools, and apply sandboxing to limit the impact of potentially compromised packages.

  • Different payload mechanisms for npm vs PyPI: npm targeted configuration files and tokens, PyPI used Python dropper for remote execution
  • PyPI quarantined affected projects; security community tracking as 'mini-shai-hulud'—the first coordinated attack spanning both npm and PyPI ecosystems

Editorial Opinion

This landmark supply chain attack demonstrates that even official SDKs from trusted AI companies like Mistral AI are vulnerable to compromise. The scale and sophistication—spanning 170+ packages and coordinating attacks across npm and PyPI—suggests a shift in attacker tactics toward ecosystem-wide disruption rather than targeting high-value individual packages. The security community must accelerate adoption of package verification tools, sandboxing, and stricter access controls for high-impact packages. Without these measures, the open source foundation of modern AI development remains dangerously exposed.

CybersecurityPrivacy & DataOpen Source

More from Mistral AI

Mistral AIMistral AI
INDUSTRY REPORT

Mini Shai-Hulud Worm Compromises 160+ npm Packages, Including Mistral

2026-05-12
Mistral AIMistral AI
INDUSTRY REPORT

Shai-Hulud Campaign Compromises 160+ npm and PyPI Packages with Valid Cryptographic Signatures

2026-05-12
Mistral AIMistral AI
INDUSTRY REPORT

Massive Coordinated Supply Chain Attack Compromises 170+ npm and 2 PyPI Packages, Including Mistral AI SDKs

2026-05-12

Comments

Suggested

TursoTurso
FUNDING & BUSINESS

Turso Retires Bug Bounty Program Over AI-Generated Spam Flood

2026-05-13
OpenAIOpenAI
RESEARCH

Oracle Poisoning: Research Exposes Critical Vulnerability in AI Agent Reasoning Systems

2026-05-13
MicrosoftMicrosoft
RESEARCH

Critical RCE Vulnerability Discovered in VSCode Copilot Chat Agent Mode

2026-05-13
← Back to news
© 2026 BotBeat
AboutPrivacy PolicyTerms of ServiceContact Us