-
Notifications
You must be signed in to change notification settings - Fork 45
Open
Description
Recent supply chain attacks on npm have highlighted the need for stronger package publishing security. The September 2025 Shai-Hulud worm compromised 500+ packages through stolen maintainer tokens, showing the risks of token-based publishing.
Trusted publishing helps by eliminating long-lived tokens that can be stolen or accidentally exposed; generating automatic provenance provides cryptographic proof of where/how packages are built; and is an industry standard adopted by PyPI, RubyGems, crates.io, NuGet, etc.
Here's the short version:
- Configure a trusted publisher on npmjs.com
- Add
id-token: writepermission to your workflow - Remove
NODE_AUTH_TOKENfrom your workflow
npm is planning to deprecate legacy tokens and make trusted publishing the preferred method.
Would you consider adopting trusted publishing to help secure the npm ecosystem?
References:
Metadata
Metadata
Assignees
Labels
No labels