Respond

StepSecurity's Respond capabilities help your organization investigate, contain, and remediate NPM supply chain attacks quickly and confidently. In fast-moving incidents, detection alone is not enough — teams need actionable intelligence, real-time alerts, and forensic-level visibility to understand what happened and how to fix it.

This page describes real incident scenarios and the StepSecurity components that power rapid response.

Scenario 1: A supply chain attack is unfolding right now and your security team needs actionable intelligence within minutes

The window between compromise and exploitation keeps shrinking. During incidents like tj-actions, nx, and multiple NPM malware campaigns, StepSecurity customers needed one thing immediately:

“Tell me exactly what this attack is, what it does, which versions are affected, and what to do next.”

Traditional vulnerability feeds lag behind by days or weeks — far too slow for active supply chain attacks.

How StepSecurity responds

Powered by: Threat Intelligence + Threat Center

  • Real-time alerts about compromised packages, hijacked maintainers, and emerging attack campaigns

  • Delivered directly into your existing SIEM and SOC workflows through S3 and webhooks

  • No new integration needed — uses your current StepSecurity setup

  • Alerts include:

    • Attack summary

    • Technical analysis

    • Indicators of compromise (IoCs)

    • Affected versions

    • Recommended remediation steps specific to your environment

  • Threat Center provides a dashboard view with historical incidents, analysis, and guidance

Why this matters

  • Reduces Mean Time To Detect (MTTD) from days to minutes

  • Puts all teams (security, engineering, platform) on the same page

  • Ensures your SOC is triggered immediately with correct, contextual intelligence

  • Uses the same detection systems that discovered tj-actions, nx, and large NPM malware bursts

Scenario 2: A malicious NPM package is confirmed and you need to know exactly which PRs, repos, and teams were impacted

Once you learn a package is compromised, the next question is:

“Where did this package enter our organization?”

Speed matters and you cannot afford manual codebase review or repo-by-repo searches.

After the disclosure of the 20 Popular NPM Packages Compromised incident, organizations needed to quickly identify which PRs had introduced malicious versions of packages like chalk and debug. In many cases, exposure occurred through routine dependency upgrades that had already been merged across multiple repositories.

How StepSecurity responds

Powered by: NPM Package Search

  • Instantly identifies every PR that introduced or updated the malicious package

  • Shows which repositories and services are impacted

  • Enables tenant-wide searches for organizations operating multiple GitHub orgs

  • Allows filtering by repo, time range, or package version

  • Provides a precise blast-radius view for prioritizing remediation

Why this matters

  • Eliminates the “unknown exposure gap” during incidents

  • Allows surgical remediation instead of broad panic

  • Helps teams roll back, patch, or hotfix only the affected areas

  • Speeds up coordinated response across engineering groups

Scenario 3: You must determine whether a malicious package executed malicious behavior inside CI/CD especially network exfiltration attempts

Many NPM attacks use postinstall scripts to steal secrets, tokens, or environment variables using outbound network calls.

Security teams often ask:

“Did any CI/CD workflow contact a malicious domain?”

During the Nx build system compromise and the GhostAction campaign, attackers attempted to exfiltrate secrets by making outbound network calls from CI/CD environments. Determining whether those calls actually occurred was critical for deciding whether secret rotation was required.

How StepSecurity responds

Powered by: Harden-Runner Network Baselines

  • Automatically logs all outbound network destinations per job, repo, runner, and organization

  • Establishes expected “normal” traffic patterns

  • Highlights deviations from baseline behavior (e.g., sudden calls to unknown domains)

  • Identifies DNS exfiltration attempts where attackers encode data inside DNS lookups

  • Lets you query for suspicious domains or IoCs from Threat Intelligence

  • Supports investigation down to the workflow-run level

Why this matters

  • Provides forensic proof of whether a malicious script executed

  • Helps confirm whether secrets may have been exfiltrated

  • Enables targeted secret rotation

  • Surfaces anomalous destinations at job, repo, cluster, or org level

Scenario 4: Your organization needs to coordinate remediation across many repositories and teams

During incidents like tj-actions and nx, companies often needed to:

  • Revert affected PRs

  • Remove malicious dependencies

  • Rotate secrets

  • Patch workflows

  • Harden network policies

Doing this repo-by-repo is slow and inconsistent.

In both the tj-actions breach and Nx compromise, organizations struggled to coordinate remediation across dozens or hundreds of repositories. Teams needed a shared, authoritative view of which repos were affected, what actions were required, and whether malicious behavior had actually occurred.

How StepSecurity responds

Powered by:

  • Threat Intelligence (what happened + remediation steps)

  • NPM Package Search (which repos require fixes)

  • Network Baselines (whether malicious code executed)

Together, StepSecurity enables:

  • A prioritized list of affected repositories

  • Consistent remediation guidance for all teams

  • Automated alerts pushed into existing SOC tooling

  • Confidence in which repos require secret rotation or dependency removal

Why this matters

  • Reduces remediation time dramatically

  • Ensures no affected repo falls through the cracks

  • Aligns engineering and security teams around a shared source of truth

Scenario 5: After the incident, you need to verify that remediation was successful and no hidden risk remains

After fixes are applied, teams must verify:

  • No repo still uses the compromised package

  • No CI job is contacting malicious domains

  • No dependency reintroduced risk in later PRs

  • All IoCs are clear across logs and workflows

Following cleanup efforts after the Shai-Hulud and popular NPM package compromise incidents, teams needed to validate that malicious dependencies were fully removed, no outbound exfiltration persisted, and no later PRs accidentally reintroduced the compromised versions.

How StepSecurity responds

Powered by:

  • NPM Package Search

  • Network Baselines

  • Threat Center

Why this matters

  • Ensures complete closure of the incident

  • Supports audit logs, compliance, and postmortems

  • Provides confidence that issues won’t resurface

  • Validates that remediation steps were applied consistently

Last updated

Was this helpful?