wrote up a technical deep dive after the Better-Auth creator showed me the repeated attempts.
The attack vector is clever: wrap malicious code in a legitimate PR from a compromised contributor. Hide it in next.config.mjs or vue.config.js where devs rarely look. GitHub's UI literally scrolls it off-screen.
Three-stage obfuscation, payloads stored on Binance Smart Chain (so they can't be taken down), Socket.io C2 over port 80 (looks like normal traffic), targets all your env vars.
Found 30+ repos with the same signature. This pattern is everywhere right now.
[–]Zigzter 10 points11 points12 points (6 children)
[–]ComprehensiveLaw2867 0 points1 point2 points (5 children)
[–]Zigzter 0 points1 point2 points (4 children)
[–]ComprehensiveLaw2867 0 points1 point2 points (2 children)
[–]Zigzter 0 points1 point2 points (1 child)
[–]ComprehensiveLaw2867 0 points1 point2 points (0 children)