The Changelog: Software Development, Open Source

Securing npm is table stakes (Interview)

23 snips
Jan 29, 2026
Nicholas C. Zakas, seasoned JavaScript engineer and creator/maintainer of ESLint, critiques npm security and shares hard-earned tooling perspective. He discusses mass compromise patterns, maintainer risks, GitHub’s response and trusted publishing limits. He also explores anomaly detection, registry alternatives like JSR and Volt, and funding or stewardship paths forward.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
INSIGHT

Repeated Attack Pattern Signals Bigger Threat

  • The NPM attacks in 2025 repeatedly used credential theft and malicious pre/post-install scripts to spread quickly.
  • Nicholas Zakas warns these frequent low-damage incidents likely foreshadow a more damaging, large-scale attack if nothing changes.
ANECDOTE

ESLint's Publish Compromise And Response

  • ESLint experienced suspicious pull requests and once had a compromised publish via reused credentials.
  • That incident led Nicholas to remove individual publish rights and tighten ESLint's publishing process.
ADVICE

Rotate Tokens Or Use Just-in-Time Credentials

  • Use fine-grained, short-lived tokens or trusted publishing to avoid long-lived credentials.
  • Prefer on-demand OpenID Connect tokens in CI to eliminate stored publish credentials where practical.
Get the Snipd Podcast app to discover more snips from this episode
Get the app