Detect
StepSecurity's Detect capabilities give your organization continuous visibility into NPM dependency usage — across PRs, repositories, and time. This section explains the real scenarios where detection matters and the StepSecurity features that power these workflows.
Scenario 1: A newly disclosed malicious NPM package hits the ecosystem and you need to know everywhere it was used
When a package is declared malicious, every security team asks the same immediate question:
“Where in our organization has this package ever been introduced?”
Manually searching through repositories, branches, and lockfiles is slow, error-prone, and often incomplete.
After the disclosure of the Shai-Hulud: The Second Coming campaign, security teams needed to rapidly determine whether compromised packages used across Zapier, ENS Domains, and other ecosystems had ever been introduced into their repositories. In many cases, exposure was limited to specific PRs or short-lived updates that were not obvious from current dependency state alone.
How StepSecurity detects this
Powered by: NPM Package Search
Search across all PRs in all repositories
Identify every PR where the package was introduced
Understand the blast radius instantly
Run both custom searches and compromised-package searches
Search at either the organization or tenant level
Why this matters
Reduces incident response from hours to minutes
Ensures complete visibility across all teams and repos
Prevents missed exposures in large or distributed organizations
Scenario 2: A developer adds or updates a dependency in a PR — and you need to know whether it’s malicious or high-risk
Every dependency update is a potential supply chain entry point. If a package is known malicious, recently weaponized, or flagged by StepSecurity’s intelligence, you need real-time detection before the merge happens.
In the 20 Popular NPM Packages Compromised incident, malicious versions of widely trusted packages like chalk and debug were introduced via normal version bumps in PRs. Without real-time detection at PR time, these changes would have merged unnoticed, even though the package names themselves were already deeply trusted across the ecosystem.
How StepSecurity detects this
Powered by: NPM Package Compromised Updates
Every PR modifying package.json or lockfiles is evaluated
Dependency changes are compared against StepSecurity’s real-time compromised package intelligence
Includes both confirmed malicious packages and packages flagged as high-risk
If a dependency is unsafe, the PR fails immediately and the developer is notified
Why this matters
Prevents compromised packages from merging into main
Gives developers instant clarity while the PR is still open
Detects threats before CVEs or advisories are published
Helps maintain consistent dependency hygiene across teams
Scenario 3: You need to understand whether you were exposed in the past even if the dependency has been removed
A malicious package might have been introduced weeks or months ago, merged briefly, and then removed during cleanup. During an incident, you need to answer:
“Were we ever using this dependency? When was it introduced? In which PR?”
Even if the dependency is no longer in your repositories today, the historical introduction event still matters.
During investigations into the Nx build system compromise, teams discovered that the malicious package had been introduced temporarily in some repositories and later removed. Organizations still needed to determine whether CI runs occurred during that exposure window, even though the dependency no longer existed in the current codebase.
How StepSecurity detects this
Powered by: NPM Package Search
Tracks when and where packages were added through PRs
Allows you to search historical PR introduction events
Enables reconstruction of exposure windows
Works even if the dependency no longer exists in the current codebase
Why this matters
Essential for forensic investigations
Enables accurate determination of exposure periods
Supports compliance and post-incident reporting
Scenario 4: A package appears suspicious before it is officially declared malicious and you want early warning signals
Many supply chain attacks have early behavioral signals long before the security community identifies them:
Sudden ownership changes
Unusual publishing activity
Publisher anomalies
Strange versioning patterns
Connections to past malicious campaigns
These are early “smoke signals” that often precede large-scale compromises.
Prior to full disclosure of the Shai-Hulud resurgence, affected packages showed abnormal publishing behavior and ties to previously compromised maintainers. These early indicators appeared before public advisories but were critical for identifying risk ahead of widespread impact.
How StepSecurity detects this
Powered by: StepSecurity Research & Automated Detection Systems
Ecosystem-wide monitoring surfaces anomalous NPM activity
Proprietary signals flag suspicious packages early
StepSecurity intelligence feeds into PR checks and search workflows
Alerts appear even before public disclosures
Why this matters
Allows teams to take proactive action
Helps prevent early-stage adoption of risky dependencies
Provides visibility into emerging NPM threats at their earliest stage
Scenario 5: You need consistent visibility into dependency usage across many repositories
Organizations with microservices or large engineering teams often struggle to answer:
• Which repos use which dependencies? • Are we using the same package versions everywhere? • Where do we have outdated, drifted, or duplicated dependencies?
During the GhostAction investigation, widespread secret exfiltration across hundreds of repositories highlighted how difficult it was for organizations to quickly understand which repositories shared common tooling, workflows, and dependencies — and therefore shared exposure.
How StepSecurity detects this
Powered by: NPM Package Search
Aggregates dependency introduction events across all repos
Provides a unified view of package usage
Highlights inconsistencies, outdated usage, and hotspots
Makes cross-repository dependency governance feasible
Why this matters
Reduces supply chain sprawl
Improves upgrade planning
Creates a consistent security posture across services
Last updated
Was this helpful?