Important Security Information Regarding a Recent NPM Supply Chain Attack #8385
Replies: 6 comments 3 replies
-
|
Thanks for sharing |
Beta Was this translation helpful? Give feedback.
-
|
This is very important to specify exact hours range and time zone in question. "September 8" lasted 48 hours worldwide. |
Beta Was this translation helpful? Give feedback.
-
|
Love you |
Beta Was this translation helpful? Give feedback.
-
|
Hi Ryan/anyone else, Regarding step 1, clear your local and CI/CD build caches. Does this erase any existing saved chats? Or scripts that CLI has created? Sorry I'm too technical and have just been using CLI for personal spreadsheets analysis on my PC. Thanks |
Beta Was this translation helpful? Give feedback.
-
Beta Was this translation helpful? Give feedback.
-
|
Vendor Google Cloud Product Dataform Versions 1 Total Default Status: unaffected affected affected from 08/7/2025 before 08/21/2025 This seams related |
Beta Was this translation helpful? Give feedback.

Uh oh!
There was an error while loading. Please reload this page.
-
On September 8, 2025, the Node Package Manager (NPM) ecosystem was targeted by a large-scale software supply chain attack. Threat actors gained access to the accounts of several package maintainers and published malicious versions of widely-used NPM packages.
We want to be clear: The Gemini CLI source code itself was not compromised, and our servers remain secure.
However, this incident may have affected users who installed or updated the Gemini CLI during the attack window using the NPM installation method. We are providing details on the incident, clarifying who is impacted, and outlining the steps users should take to ensure their systems are secure.
What Happened?
On September 8, 2025, attackers compromised the NPM accounts for several popular JavaScript packages through a targeted phishing campaign. They then published new versions of these packages containing malicious code designed to steal cryptocurrency.
One of the official installation methods for the Gemini CLI is through NPM. While the Gemini CLI package
(@google/gemini-cli)was not compromised, the installation process may have pulled in a compromised dependency if performed during the brief window the attack was active.Who is Impacted?
This issue only affects a specific group of users:
You may be affected if:
You are not affected if:
What You Should Do
The compromised dependencies were designed to inject malicious, client-side code into the applications you were building. If you installed or updated the Gemini CLI via NPM on September 8th, or used it in a development environment during that window, we recommend impacted users take the following steps:
Rebuild and Re-deploy Applications: This is the most critical step. You must rebuild any applications (especially frontend web projects) that were built, bundled, or deployed on or around September 8th. This ensures that any malicious code injected into your compiled assets is purged.
Invalidate CDN and Browser Caches: After re-deploying your clean application builds, issue an invalidation command for all related JavaScript assets on your Content Delivery Network (CDN). This forces your end-users to download the new, secure versions rather than loading a poisoned version from a cache.
Audit Your Projects: As a best practice, run
npm auditwithin your own individual project directories (not just globally) to identify and remediate any other vulnerable dependencies.Beta Was this translation helpful? Give feedback.
All reactions