Invisible Code Is Now Flooding GitHub. Your Code Review Won't Catch It.
A new supply-chain attack is hiding malicious code in plain sight using invisible Unicode characters. Traditional defenses? Completely useless.
⚡ Key Takeaways
- 151 malicious packages using invisible Unicode characters evaded detection across GitHub, NPM, and Open VSX in March 2024 𝕏
- Traditional code reviews and static analysis tools fail against invisible code because the malicious payload doesn't appear on screen 𝕏
- An LLM-powered attack group called Glassworm is likely behind the coordinated campaign, generating convincing legitimate-looking changes at scale 𝕏
Worth sharing?
Get the best Open Source stories of the week in your inbox — no noise, no spam.
Originally reported by Ars Technica - Tech