Skip to content

Commit ed76d2d

Browse files
committed
docs: correct npm token references in CanisterWorm assessment
webssh2 is not published to npm and never had npm tokens configured. Remove incorrect NPM token rotation remediation step.
1 parent 2b82b22 commit ed76d2d

File tree

1 file changed

+6
-7
lines changed

1 file changed

+6
-7
lines changed

SECURITY.md

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -170,20 +170,19 @@ This repository uses `aquasecurity/trivy-action` in CI (`ci.yml`):
170170
- The pinned SHA `76071ef0d7ec797419534a183b498b4d6366cf37` predates
171171
the compromise and was verified against the pre-incident
172172
repository state
173-
- This repository does not publish to npm, so there are no npm
174-
tokens for the worm to exfiltrate or abuse
173+
- This repository does not publish to npm and has no npm tokens
174+
configured, so there is nothing for the worm to exfiltrate or
175+
abuse
175176
- No known compromised dependencies were found in
176177
`package-lock.json`
177178

178179
### Remediation actions taken
179180

180-
1. **NPM token rotation**: All npm tokens with CI access were
181-
rotated as a precaution (2026-03-24)
182-
2. **Trivy action review**: Confirmed pinned SHAs correspond to
181+
1. **Trivy action review**: Confirmed pinned SHAs correspond to
183182
legitimate pre-compromise commits
184-
3. **IOC scan**: Checked build systems for CanisterWorm filesystem
183+
2. **IOC scan**: Checked build systems for CanisterWorm filesystem
185184
artifacts — none found
186-
4. **Dependency audit**: Scanned all `package-lock.json` files
185+
3. **Dependency audit**: Scanned all `package-lock.json` files
187186
against known compromised package list — clean
188187

189188
### CanisterWorm indicators of compromise (IOCs)

0 commit comments

Comments
 (0)