Risky Bulletin

Risky Bulletin: Plone CMS stops supply-chain attack

Feb 4, 2026
A halted supply‑chain sabotage against a CMS and a six‑month compromise of Notepad++ servers that pushed targeted backdoor updates. A spike in malicious OpenClaw skills and a massive API token leak. French police raids tied to AI deepfake nudity probes and companies disabling license‑plate readers after unauthorized access.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
INSIGHT

Supply-Chain Inserted Code Targeted Developers

  • A threat actor inserted credential-stealing code into the Plone CMS project by compromising a developer's account token.
  • GitHub's team said the malicious changes targeted developers, not site visitors, and were removed before release.
INSIGHT

OpenClaw Skills And Token Leak Surge

  • Malicious OpenClaw skills ballooned from 28 to 400 in a week, often stealing credentials or deploying malware.
  • A misconfigured database also exposed over 1.5 million API tokens and agent messages for the Maltbook platform.
ADVICE

Scan Extensions For Malicious Patterns

  • OpenVSX will scan VS Code extensions for malicious code, typo-squats and leaked credentials to curb malware.
  • Relying on marketplace scanning reduces the risk from self-replicating extensions like Glassworm.
Get the Snipd Podcast app to discover more snips from this episode
Get the app