Bitwarden CLI Supply Chain Compromise: Trusted Secrets Tooling Becomes the Entry Point

Kodem Security Research Team
April 28, 2026
April 28, 2026

0 min read

Vulnerabilities
Bitwarden CLI Supply Chain Compromise: Trusted Secrets Tooling Becomes the Entry Point

Bitwarden CLI version 2026.4.0 was compromised after attackers gained access to its release pipeline by hijacking a GitHub Actions workflow. This allowed them to publish a tampered package to npm that executed malicious code during installation. The compromise was part of a broader supply chain attack targeting CI/CD workflows and package distribution systems, with shared infrastructure and techniques observed across multiple incidents linked to Checkmarx tooling.

Rather than exploiting an application vulnerability, the attack leveraged trusted developer tooling as the entry point. Since Bitwarden CLI is commonly used to retrieve and manage secrets in CI/CD pipelines and developer environments, the malicious package executed directly in contexts where sensitive credentials were already accessible.

Independent analysis from JFrog and OX Security has identified overlaps in infrastructure, techniques and payload behavior with broader supply chain campaigns, including activity sometimes referred to as TeamPCP and Shai-Hulud, though attribution remains inconclusive.

What Happened

Attackers gained access to the Bitwarden CLI release pipeline by compromising a GitHub Actions workflow and exfiltrating CI/CD tokens. This access allowed them to modify the package before publication and release a malicious version @bitwarden/cli@2026.4.0 to npm.

This access allowed them to:

  • Include malicious code in the package contents through a bw1.js file.
  • Add a preinstall hook that triggered during npm install.
  • Publish the compromised version through the official npm distribution channel.

During installation, the malicious package executed a preinstall script that deployed a credential-harvesting payload. The payload retrieved and executed additional code, including a bundled runtime, to enumerate and extract sensitive data from the host environment.

The payload targeted credentials and sensitive artifacts already present in the execution environment, including:

  • Cloud provider credentials: AWS, GCP, Azure.
  • GitHub and npm authentication tokens.
  • SSH keys and local configuration files.
  • Shell history and developer environment artifacts.
  • AI tooling and MCP-related configuration files.

When GitHub tokens were discovered, the malware used them to inject malicious GitHub Actions workflows into accessible repositories. This enabled further extraction of CI/CD secrets and created a path for lateral movement across pipelines and projects. 

Collected data was encrypted with AES-256-GCM and exfiltrated to attacker-controlled infrastructure audit.checkmarx[.]cx. If primary exfiltration failed, data was committed to attacker-controlled GitHub repositories as a fallback channel.

Since the package was distributed through the official npm registry, it executed within trusted environments, including developer machines and CI/CD pipelines where credentials were already available.

The malicious version was available for approximately 93 minutes before removal. Despite the short exposure window, installations occurred in both developer environments and automated pipelines, increasing the likelihood of credential exposure and downstream compromise.

What This Incident Shows

This attack reinforces a shift in how supply chain compromises operate:

  1. The entry point is no longer the application: Attackers are targeting build pipelines and developer tooling, where trust is implicit and protections are weaker.
  2. Installation is execution: The use of preinstall hooks turns dependency installation into an execution vector, allowing code to run before any application logic is invoked.
  3. Credentials are the real objective: The goal is not persistence within the package, but access to tokens and secrets that enable lateral movement across CI/CD systems.
  4. One installation can expand the blast radius: A single compromised developer environment can expose tokens that allow attackers to modify pipelines, access repositories and propagate further.
  5. Trusted distribution channels amplify impact: Publishing through npm ensures the malicious code runs inside environments that already have privileged access.

What’s Affected

  • Bitwarden CLI npm package: @bitwarden/cli@2026.4.0
  • Developer environments where the CLI was installed locally.
  • CI/CD pipelines using Bitwarden for secrets retrieval and automation.

Only environments that installed or updated to version 2026.4.0 during the exposure window are at risk (April 22, 2026, 5:57 PM - 7:30 PM ET). 

Immediate Actions

  1. Identify exposure scope: Locate installs of @bitwarden/cli@2026.4.0 across developer machines, CI/CD pipelines and automation workflows.
  2. Remove compromised version: Uninstall @bitwarden/cli@2026.4.0 and clear the npm cache before reinstalling the verified version 2026.4.1.
  3. Rotate credentials immediately: Bitwarden, npm, cloud providers: GitHub, AWS, GCP and Azure and any tokens stored or accessed on affected systems.
  4. Review for unauthorized activity: Audit GitHub Actions workflows, CI/CD logs and repository activity for:
    1. Unexpected workflow changes.
    2. New or modified automation jobs.
    3. Suspicious outbound connections.
  5. Limit credential exposure in CI/CD: Restrict token scope, avoid long-lived credentials and restrict automation permissions for workflows.

The Broader Pattern

This incident follows a recurring supply chain pattern: attackers compromise build and release pipelines to distribute trusted software as the delivery mechanism.

Instead of exploiting application code, they:

  1. Gain access to CI/CD and release workflows.
  2. Inject code into trusted artifacts.
  3. Publish through official distribution channels.
  4. Execute inside environments where secrets are already accessible.

This pattern has been observed across multiple campaigns targeting CI/CD systems, developer tooling and package registries.

The Bottom Line

The Bitwarden CLI incident underscores a fundamental shift in supply chain threats: the focus has moved from exploiting code vulnerabilities to compromising trusted execution paths.

Risk is now defined not just by a package's contents, but by its operational context. Since this tool executed within environments that already contained highly sensitive credentials, a single installation served as a gateway for extensive compromise. Consequently, security strategies must evolve beyond identifying potential vulnerabilities; they must prioritize monitoring what code actually runs, the environment in which it executes and its access at runtime.

References

  1. Bitwarden Community Forums. April 23, 2026. Bitwarden Statement on Checkmarx Supply Chain Incident. Bitwarden.
  2. BleepingComputer. April 23, 2026. Bitwarden CLI npm Package Compromised to Steal Developer Credentials. BleepingComputer
  3. Endor Labs. April 23, 2026 The Bitwarden CLI Supply Chain Attack: What Happened and What to Do. Endor Labs.
  4. JFrog. April 23, 2026.TeamPCP Campaign Spreads to npm via a Hijacked Bitwarden CLI. JFrog.
  5. OX Security. April 23, 2026. Shai-Hulud: The Third Coming — Bitwarden CLI Backdoored in Latest Supply Chain Campaign. OX.
  6. SecurityWeek. April 24, 2026. Bitwarden NPM Package Hit in Supply Chain Attack. SecurityWeek
  7. SC Media. April 24, 2026. Checkmarx supply chain hack impacts Bitwarden CLI. SC Media.
  8. The Hacker News. April 23, 2026. Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Campaign. The Hacker News.
Table of contents

Related blogs

The NIST NVD update changes vulnerability management more than most teams realize

NIST’s April 15, 2026 update to NVD operations is easy to summarize and easy to underread. The headline change is familiar by now: NIST will continue listing all CVEs, but it will only immediately enrich a subset, prioritizing CISA KEV, software used within the federal government, and software covered by Executive Order 14028’s critical software definition.

April 23, 2026

7

CanisterSprawl: What’s at risk, and what to do next

The campaign tracked as CanisterSprawl is a supply chain intrusion in which malicious npm package versions execute at install time, harvest credentials from developer environments, exfiltrate that material to attacker-controlled infrastructure and then attempt to republish poisoned packages using stolen publisher tokens.

April 23, 2026

4

Adobe Reader Zero-Day Exploited Through Malicious PDFs

A zero-day vulnerability in Adobe Reader was actively exploited for several months through malicious PDF files. The campaign allowed attackers to steal sensitive data, fingerprint victims, deliver follow-on payloads and potentially achieve arbitrary code execution and full system compromise.

April 13, 2026

3

Stop the waste.
Protect your environment with Kodem.

Get a personalized demo
Get a personalized demo

A Primer on Runtime Intelligence

See how Kodem's cutting-edge sensor technology revolutionizes application monitoring at the kernel level.

5.1k
Applications covered
1.1m
False positives eliminated
4.8k
Triage hours reduced

Platform Overview Video

Watch our short platform overview video to see how Kodem discovers real security risks in your code at runtime.

5.1k
Applications covered
1.1m
False positives eliminated
4.8k
Triage hours reduced

The State of the Application Security Workflow

This report aims to equip readers with actionable insights that can help future-proof their security programs. Kodem, the publisher of this report, purpose built a platform that bridges these gaps by unifying shift-left strategies with runtime monitoring and protection.

Get real-time insights across the full stack…code, containers, OS, and memory

Watch how Kodem’s runtime security platform detects and blocks attacks before they cause damage. No guesswork. Just precise, automated protection.

Combined author
Kodem Security Research Team
Publish date

0 min read

Vulnerabilities