How a supply-chain attack exploited TanStack CI workflows
A sophisticated npm compromise leveraged GitHub Actions flaws to poison caches and steal tokens, exposing risks in CI pipelines. Learn how the attack unfolded and how to audit your own workflows.