Cloud-Native Digest is your monthly overview of all things open-source, supply chain security, and more ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­    ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­  
View in browser
DIGEST_Newsletter-Banner_10

Edition: April 2026

Brought to you by Nigel Douglas, Head of Developer Relations at Cloudsmith.

 

The recent compromise of the axios NPM package by North Korean-linked threat actors serves as a stark reminder of the fragility of our foundational dependencies, and how we securely consume libraries from open-source registries. As NIST signals its inability to keep pace with the record-breaking surge in CVE submissions, the industry is forced to move beyond traditional scanning.

 

The CSA also released a whitepaper on building a “Mythos-ready” security program. It’s essential at this point to prioritize robust dependency management to reduce vulnerabilities in third-party and open-source components. This month’s briefing focuses on the hardened standards and software engineering workflows required to achieve compliance and resilience in an increasingly volatile ecosystem.

VULN ROUND UP 

 

Common Vulnerabilities & Exposures

X number of days since the last OpenClaw CVE
Intruder.io
Since it was released on 24th November 2025, OpenClaw has averaged almost 2 CVEs per day. The software is so flawed from a security perspective, the team at Intruder built an interactive website to help users understand the OpenClaw threat landscape.

 

Hackers exploit known vulnerability to breach 766 Next.js hosts and steal credentials
NVD:
CVE-2025-55182

Attackers are exploiting a critical Next.js RCE vulnerability to deploy the NEXUS Listener framework (UAT-10608), harvesting cloud credentials, SSH keys, Kubernetes tokens, and API keys from compromised systems.

 

Flowize has a CVSS 10.0 RCE flaw now under active attack
NVD:
CVE-2025-59528
Attackers are exploiting a max-severity code injection flaw in Flowize's CustomMCP node, enabling remote code execution, data exfiltration, and full system compromise via unvalidated JavaScript execution.

 

Actively exploited nginx-ui flaw enables full Nginx takeover
NVD:
CVE-2026-33032
The critical auth bypass dubbed MCPwn (CVSS 9.8) lets attackers hijack nginx-ui by sending crafted requests to an unsecured MCP endpoint. Frequently chained with CVE-2026-27944 to extract sensitive node_secret keys from unauthenticated backups.

 

Marimo weaponized to deploy a blockchain botnet via HuggingFace
NVD: CVE-2026-39987

A pre-auth RCE in marimo notebooks was weaponized within ten hours to harvest credentials, move laterally, and deploy NKAbuse - a Go-based RAT using the NKN blockchain for C2 - hosted on a typosquatted HuggingFace Space to evade detection.

IN THE NEWS

 

Supply Chain Security

Axios NPM distribution compromised
Source: Cloudsmith

UNC1069 compromised axios versions 1.14.1 and 0.30.4 by hijacking a maintainer account and introducing a malicious dependency that deployed the WAVESHAPER.V2 backdoor across Windows, macOS, and Linux - enabling file theft, process execution, and credential harvesting.

 

High-impact node.js maintainers targeted in social engineering campaign
Source: Socket

A UNC1069-linked campaign is targeting Node.js maintainers by posing as recruiters, building rapport over weeks, then luring victims into spoofed video calls where they're tricked into running malware.

 

LiteLLM/Telnyx supply-chain attacks
Source: The Python Package Index Blog

Attackers exploited a dependency in LiteLLM and telnyx to steal API tokens and inject credential-harvesting malware into legitimate updates, exposing developers who installed unpinned versions during a brief window before PyPI remediated the threat.

 

Rethinking post-deployment vulnerability detection
Source: OpenSSF

The industry is shifting toward using SBOMs as dynamic assets - continuously correlating deployed system metadata against real-time vulnerability databases like OSV.dev - to replace costly, periodic rescanning with near-instant automated detection.

 

Why is PURL so important for software security?
Source: Tom Alrich Blog

The NVD's reliance on CPE codes is failing, leaving over half of new vulnerabilities unenriched and invisible to automated tools. Tom advocates for PURL - a decentralized, machine-readable package identifier - as the fix.

Kubernetes

LLMs on Kubernetes: Understanding the threat model
Source: Cloud-Native Computing Foundation

While Kubernetes excels at isolating and scheduling containerized workloads, it remains blind to the unique security risks of LLMs, which operate on probabilistic logic rather than deterministic code. Running an LLM creates an app-layer vulnerability where untrusted user input can bypass traditional infrastructure controls, leading to risks like prompt injection, sensitive data disclosure, unverified supply chains, & excessive agency.

 

Rendering OCI Images the right way with ocirender
Source: Edera

To solve the persistent whack-a-mole bugs of OCI image assembly, Edera developed ocirender, a Rust library that replaces traditional layer extraction with a high-performance streaming merge engine. By shifting to a newest-first processing model, the tool can immediately identify authoritative file versions and whiteouts, streaming data directly from compressed layer blobs into a final output (like SquashFS) without intermediate disk extraction.

 

RAXE-2026-045: The TeamPCP supply chain campaign
Source: Raxe.ai

The TeamPCP supply chain campaign compromised several high-profile security tools (including Trivy and LiteLLM) to execute aggressive lateral movement within Kubernetes environments. The attack specifically deployed privileged pods into the kube-system namespace, mounting host filesystems and gaining full network/PID access to every node.


idle: The chillest container you'll ever run
Source: Github (@spurin)

If you’re not familiar with idle, the premise is simple. It’s an ultra-lightweight container that does nothing - reliably. Perfect for Kubernetes workloads where you need a running container without the memory and CPU overhead of nginx, busybox, or alpine.

AI, MLLs & MCP

Claude Code source leaked via npm packaging error
Source: The Hacker News

Anthropic confirmed that a packaging error inadvertently leaked the source code for Claude Code via a map file in an npm registry, exposing nearly 2,000 TypeScript files. While the company stated no customer data was compromised, the leak revealed significant internal project designs, including a self-healing memory architecture, a persistent agent feature called KAIROS, and an Undercover Mode for stealthy open-source contributions.


Gemma 4: Expanding the Gemmaverse with Apache 2.0
Source: Google Open Source Blog

Google has released Gemma 4 (up to 31B parameters) under the Apache 2.0 license - a significant shift from previous restrictive terms that gives developers full freedom to modify, redistribute, and deploy models privately without legal friction.


MCP is alive, but faces challenges
Source: AI Business

Now under the Linux Foundation, Anthropic's MCP is the de facto standard for connecting AI agents to data - but context bloat, sync issues, and security concerns are causing friction, with some vendors stepping back while Uber and AWS double down on centralised gateways.

 

Anthropic blocks OpenClaw from Claude subscriptions
Source: The Tech Buzz

Effective April 4th, Anthropic removed OpenClaw integration from its standard Claude subscriptions, forcing users onto a separate pay-as-you-go billing model. This strategic shift appears to be a response to OpenClaw creator Peter Steinberger joining rival OpenAI, signaling a move toward a more closed ecosystem.

 

Hugging Face introduces Kernels on the hub
Source: Hugging Face

Hugging Face Kernels standardizes how GPU kernels are built, distributed, and loaded - fetching the right build for your system automatically and eliminating hours-long local compilation times.

COMMUNITY

 

Events & Meet-ups

Webinar | 2026 Artifact Management Trends
Date/Time: Today at 11am EST / 4pm BST
Location: Virtual Webinar

A live panel with Cloudsmith CEO Glenn Weinstein, VP of Product Alison Sickelka, and CTO Lee Skillen - hosted by Meghan McGowan, Cloudsmith’s Principal Product Marketer - exploring the key findings from this year's 2026 Artifact Management Report.

 

Webinar | How platform engineering unlocks CRA readiness
Date/Time: May 21, 2026 (5pm BST)
Location: Virtual Webinar

In this upcoming Platform Engineering hosted webinar, myself and James Matchett (Head of Security, Cloudsmith), will explore how platform teams can turn CRA compliance into automated, developer-friendly workflows. We'll cover key CRA deadlines, embedding requirements into your IDP, and enriching SBOMs with threat intelligence to hit tight reporting windows.

 

On-demand LinkedIn Live | Lessons from the axios npm attack
Location: On-Demand LinkedIn Live Briefing

Myself and Jenn Gile (Co-Founder, OpenSourceMalware) break down how UNC1069 compromised axios - a package with 100M+ weekly downloads - and share practical steps to reduce your exposure.

Signed, sealed, and delivered - see you next issue.

Nigel Douglas

Nigel Douglas

Head of Developer Relations

Cloudsmith

Cloudsmith, 7 Donegall Square West, Belfast, Northern Ireland BT1 6JH

Unsubscribe Manage preferences

LinkedIn
X
Instagram
Website