In September 2025, the popular npm package @ctrl/tinycolor became the epicenter of a self-propagating supply chain attack, now known as the Shai-Hulud campaign. What started as a single compromised package quickly spread across the npm ecosystem, affecting dozens — if not hundreds — of dependent libraries. The impact reached the enterprise level, with CrowdStrike confirming that some of its packages were compromised, demonstrating that even security leaders are not immune to the ripple effects of open-source vulnerabilities.
This incident illustrates a painful truth for organizations: the open-source ecosystem, often treated as a passive tool, can become a weapon in the hands of attackers who exploit developer accounts, automation scripts, and CI/CD pipelines.

Black Kite’s Shai-Hulud NPM FocusTag™ details critical insights on the event for TPRM professionals.
The Shai-Hulud campaign is a stark reminder that supply chain worms can lie dormant, tunneling silently beneath the surface of organizations for years. All it takes is a single misstep—a compromised developer account, a poisoned package—for the worm to awaken and bring the entire structure to the brink of collapse.
The attack relied on a malicious postinstall script embedded in @ctrl/tinycolor. Here’s how it worked:
This combination of credential harvesting, automated propagation, and repository compromise makes Shai-Hulud one of the most sophisticated npm supply chain attacks observed to date.
While the exact identity of the attackers remains unknown, their methodology suggests a criminally motivated, automation-driven campaign:
Unlike precision attacks from nation-state actors, Shai-Hulud prioritized speed and scale, turning the open-source ecosystem into a viral propagation network.
This campaign underscores a harsh reality for TPRM (Third-Party Risk Management) teams: dependencies are vendors, whether you have contracts with them or not.

Filtered view of companies with the Shai-Hulud NPM FocusTag™ on the Black Kite platform.
For organizations looking to strengthen their TPRM posture, the Shai-Hulud campaign provides a clear checklist:
For TPRM and third-party risk intelligence teams, the message is clear: treat dependencies like vendors, monitor them continuously, and prepare for fast-moving supply chain threats. The cost of ignoring this reality is measured not in lost time, but in compromised secrets and potential enterprise exposure.
The Shai-Hulud campaign demonstrated how the compromise of a single npm package (@ctrl/tinycolor) could rapidly spread to hundreds of dependencies and enterprise systems. Such supply chain attacks make it clear that not only direct business partners but also open-source dependencies must now be addressed within the scope of TPRM.
Black Kite provides organizations with the ability to make their dependency ecosystem visible and continuously monitored. It not only maps the direct usage of a package but also its transitive dependencies and ecosystem connections, flagging risky components. For example, in the Shai-Hulud case, affected packages could have been automatically prioritized with FocusTag™-like labels. Black Kite also enabled organizations to clearly see their own exposure by identifying repositories containing the affected packages—whether updated or still vulnerable—and the applications tied to them.
This way, companies no longer have to rely solely on delayed vendor notifications; instead, they can proactively detect risks, quickly rotate credentials, and limit access to build an effective defense.