The cybersecurity world is currently reeling from a massive supply chain attack. In May 2026, the threat actor TeamPCP successfully compromised the account of an employee at GitHub, leading to the exfiltration of approximately 3,800 internal repositories' data, now being hawked on hacker forums for $95,0001.
However, the most critical takeaway isn't the breach itself, but the methodology behind it. This incident proves that attackers are aggressively weaponizing the developer supply chain, and it suggests other software artifact marketplaces are undoubtedly already in their crosshairs.
The attack was executed through a highly sophisticated, poisoned VS Code extension (Nx Console v18.95.0)2. It highlights a glaring vulnerability in modern enterprise security: the rapid integration of AI models and autonomous agents has created a massive, highly privileged attack surface that traditional defenses are entirely unequipped to monitor.
The following sections cover exactly how the attackers bypassed traditional defenses, the blast radius of the incident, and how Koi’s Agentic Endpoint Security architecture is specifically designed to stop attacks exactly like this.
The Problem: Weaponizing the Developer Supply Chain
Rather than brute-forcing a network perimeter, the attackers targeted the software supply chain itself by hijacking a developer's repository access to push a malicious update (v18.95.0) to both the Visual Studio Marketplace and OpenVSX.
Once a developer opened a workspace, the extension quietly executed a masterpiece of "Living off the Land" stealth:
- Trusted Infrastructure Abuse: Instead of pinging a shady, newly registered domain, the malware ran an npx command fetching a second-stage payload directly from the official, legitimate nrwl/nx GitHub repository.
- Invisible Payloads: The payload was hidden in an "orphan commit" accessible only by its SHA (Secure Hash Algorithm), making it unreachable from any public branch and completely invisible to standard repository scanners.
- Total Credential Harvesting: The payload deployed six parallel collectors targeting Vault tokens, AWS metadata, GitHub tokens, 1Password CLI sessions, SSH keys, Kubernetes credentials, and .env files.
The Impact:
While the malicious extension was live for only ~18 to 36 minutes, official download numbers (28 on VS Marketplace, 41 on OpenVSX) masked the true damage. Internal analytics revealed ~6,000 extension activations. The stolen credentials from just one of those activations were enough to compromise a major enterprise environment and exfiltrate thousands of internal repositories.
Why Traditional Security Failed
Security leaders invest heavily in protecting user devices, yet frequently find themselves forced to bypass those exact systems for their engineering teams.
The root cause is operational friction. Conventional security solutions are fundamentally incompatible with standard coding workflows. Network protections often sever necessary local testing connections, vulnerability scanners trigger endless false alarms on safe application dependencies, and strict device management policies stall productivity by bottlenecking tool approvals.
To keep shipping product updates, organizations routinely grant sweeping security waivers to their technical staff during onboarding. Threat actors are fully aware of this dynamic and are aggressively targeting these unprotected workstations through open-source packages and plugins.
The Solution: How Koi Prevents the Unpreventable
Addressing this gap requires a completely different operational model. Koi provides a unified management platform tailored specifically for technical teams, centralizing protections that would otherwise require managing multiple disconnected tools.
If the compromised Nx Console update had encountered an environment protected by Koi, several specific mechanisms would have helped neutralize it:
- Frictionless Visibility: Instead of forcing the installation of intrusive tracking software that slows down development, Koi leverages the endpoint agents you already have in place. This provides comprehensive oversight of technical workflows while designed to remain completely invisible to the end user.

- Proactive Extension Monitoring: Koi includes built-in capabilities to natively track and evaluate the safety of integrated development environment (IDE) extensions. It continuously analyzes marketplace plugins for hidden risks, helping shut down malicious logic before credentials can be harvested.

- Verified Update Rollouts: While standard IT security advice emphasizes immediate patching, automatically updating developer tools introduces severe risks. Koi allows security teams to enforce automated waiting periods for new software versions. By deliberately pausing the adoption of fresh updates, organizations are better prepared to ensure malicious packages are identified and removed by the broader community before they can execute locally.


Secure the Blind Spot
This breach from the May 2026 TeamPCP attack is a reminder that open-source and extension ecosystems have made it easier than ever to trick developers into running malicious code. While traditional Endpoint Detection and Response (EDR) remains a critical piece of your overall protection, it was never designed to secure modern agentic endpoints. As a result, standard EDR is fundamentally blind to this specific type of supply chain attack.
The world has changed, and relying solely on legacy EDRs and VPN exemptions is no longer a viable strategy for your most privileged environments. To close this gap and help prevent these types of attacks from compromising your organization, you must adopt Agentic Endpoint Security (AES) to more seamlessly protect this rapidly expanding attack surface.
Security shouldn't be a roadblock for your engineering team; it should be the guardrail that keeps them moving fast.
Ready to Close the Gap?
To see how Agentic Endpoint Security (AES) can secure your developer supply chain and stop next-generation attacks, request your tailored Cortex demo today.
Reference:
2: https://github.com/nrwl/nx-console/security/advisories/GHSA-c9j4-9m59-847w