News: 0182445254

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

Bitwarden CLI Is the Next Compromise In Checkmarx Supply Chain Campaign

(Friday April 24, 2026 @05:00PM (BeauHD) from the latest-victim dept.)


Longtime Slashdot reader [1]Himmy32 writes:

> Socket Security [2]published an article on the compromise of the Bitwarden CLI client, which was pushed from Bitwarden's client repository. This breach was the next in a chain of supply-chain attacks that have [3]affected Checkmarx KICS and [4]Aqua Security's Trivy scanners .

>

> The breach was quickly detected and [5]reported by JFrog on the GitHub repository; JFrog also provided [6]a technical write-up . The Bitwarden team has released statements on [7]a blog post indicating that the compromise did not affect vault or customer data. Only 334 downloads of the affected CLI client were downloaded before removal and remediation.



[1] https://slashdot.org/~Himmy32

[2] https://socket.dev/blog/bitwarden-cli-compromised

[3] https://thehackernews.com/2026/04/malicious-kics-docker-images-and-vs.html

[4] https://arstechnica.com/security/2026/03/widely-used-trivy-scanner-compromised-in-ongoing-supply-chain-attack/

[5] https://github.com/bitwarden/clients/issues/20353#issue-4315816376

[6] https://research.jfrog.com/post/bitwarden-cli-hijack/

[7] https://community.bitwarden.com/t/bitwarden-statement-on-checkmarx-supply-chain-incident/96127



"only 334" (Score:1)

by innocent_white_lamb ( 151825 )

So "only" 334 people/companies have had their data stolen through this exploit?

Somehow that doesn't that make me feel all that much better...

Re: (Score:2)

by robot5x ( 1035276 )

> the compromise did not affect vault or customer data

from the article - "This targeting is unusually specific. In addition to standard developer secrets such as .npmrc and .git-credentials, the malware also hunts for AI tool configuration and MCP-related files, suggesting deliberate interest in environments where coding assistants or local automation tools may expose API keys or workflow secrets."

Fortune's Real-Life Courtroom Quote #7:

Q: What happened then?
A: He told me, he says, "I have to kill you because you can identify me."
Q: Did he kill you?
A: No.