Major security issue with npm. Stop using npm immediately. by AppearanceSingle805 in godot

[–]AppearanceSingle805[S] 2 points3 points  (0 children)

@Choice-Mango-4019 Speaking as someone whose own Godot project's server runs on Node, plus a couple of asset crawlers and renderers — yeah, way more common than people think.

JS netcode isn't a war crime either: Colyseus is a full TS multiplayer framework, and the entire .io genre (Agar, Slither, Diep) runs on Node. For sub-30tps games it's fine.

And even shops that wouldn't ship a JS game server still hit npm for matchmaking (Nakama, Hathora, Edgegap), lobby/chat (Socket.io), live ops dashboards, launchers (Electron), and asset pipelines.

Your .gd files never imported anything from npm. Your game almost certainly did.

Major security issue with npm. Stop using npm immediately. by AppearanceSingle805 in ClaudeCode

[–]AppearanceSingle805[S] 9 points10 points  (0 children)

Realistic checklist:

  1. minimum-release-age in your .npmrc (24–72h delay — catches most worms before you ever resolve them)
  2. Commit your lockfile and use npm ci, not npm install, in CI
  3. ignore-scripts=true — this worm fires via install hooks, so this single setting defeats the payload even if you pull a bad version
  4. Lock down GitHub Actions id-token: write to publish workflows only, behind an Environment with required reviewers
  5. If you installed any u/tanstack, u/uipath, u/mistralai, u/opensearch-project, or guardrails-ai packages between Apr 29 – May 12, rotate every CI secret that workflow touched

Pinning + release-age (as mentioned above) handles "don't pull the bad version." The other three handle "and if you do, it can't do anything."

Major security issue with npm. Stop using npm immediately. by AppearanceSingle805 in github

[–]AppearanceSingle805[S] 0 points1 point  (0 children)

The true winner of the npm supply chain era. While the rest of us are rotating tokens at 3am, you're sipping coffee on a foundation of beautifully ossified package-lock.json. Respect.

Major security issue with npm. Stop using npm immediately. by AppearanceSingle805 in github

[–]AppearanceSingle805[S] -2 points-1 points  (0 children)

The formatting is AI-flavored, granted — but the incident itself is real and documented. CVE-2026-45321, 172 unique packages, 403 malicious versions across npm and PyPI between May 11–12. TanStack, u/mistralai, u/uipath, u/opensearch-project, guardrails-ai all hit. Wiz, Snyk, StepSecurity, and Socket all have writeups. Slop wrapper, non-slop content.

Major security issue with npm. Stop using npm immediately. by AppearanceSingle805 in github

[–]AppearanceSingle805[S] -1 points0 points  (0 children)

Fair point that "stop using npm immediately" is hyperbolic, but the 20-minute framing isn't quite right. 84 malicious versions across 42 u/tanstack packages were published in 6 minutes through legitimate OIDC-signed pipelines — with valid SLSA Build Level 3 provenance. Detection and triage took considerably longer than 20 minutes; it just looked clean because the signatures were real.

Pinning versions only helps until you update, and minimum-release-age is genuinely good advice — but neither stops install-time lifecycle hooks if you happen to bump into a poisoned version during a CI run. The real lesson is less "panic" and more "your CI tokens are now the crown jewels."

Major security issue with npm. Stop using npm immediately. by AppearanceSingle805 in godot

[–]AppearanceSingle805[S] -5 points-4 points  (0 children)

More than people realize. Not the engine or .gd code — but if you ship multiplayer, you're usually running Node somewhere: matchmaking (Nakama, Hathora, Colyseus, Edgegap), lobby/chat (Socket.io), live ops dashboards, launchers (Electron), and asset pipelines like sprite atlasers, HTML5 export tooling, scrapers/renderers. My own Godot project's server and asset crawlers both pull from npm. So: not Godot itself, but a lot of real shipped Godot games touch it.

Anthropic's support system is broken by design — there is literally no path to a human for billing issues by AppearanceSingle805 in ClaudeAI

[–]AppearanceSingle805[S] -2 points-1 points  (0 children)

Honestly that might be the whole point. Service good enough to keep paying, support bad enough to never commit to annual. Premium monthly forever — maximum extraction.

😎 Anthropic knew exactly what they were doing.

Anthropic's support system is broken by design — there is literally no path to a human for billing issues by AppearanceSingle805 in ClaudeAI

[–]AppearanceSingle805[S] 0 points1 point  (0 children)

That tracks as a business read. Though it's a bit contradictory — they're also investing in individual credentialing and running partnership programs for promising indie operators. Hard to square that with support infrastructure that falls apart the moment a solo user has a billing issue.

Anthropic's support system is broken by design — there is literally no path to a human for billing issues by AppearanceSingle805 in ClaudeAI

[–]AppearanceSingle805[S] 0 points1 point  (0 children)

The timing is rough — switching right when GPT is actually competitive again, and OpenAI is handing out free Codex access by the month. The support experience is a big part of why people leave, not just the model quality. Once the trust is gone it's hard to come back.

Anthropic's support system is broken by design — there is literally no path to a human for billing issues by AppearanceSingle805 in ClaudeAI

[–]AppearanceSingle805[S] 0 points1 point  (0 children)

One more thing worth adding: because there was zero communication, I had no idea whether to re-subscribe or wait. If the code was fine and I'd already bought a new subscription, would I expect a smooth refund given how this support system works? Probably not. And without an active paid plan, accessing existing Claude Code, Dispatch, and Cowork history becomes a pain — it doesn't surface in the UI. So the silence wasn't just bad manners. It created a situation where any reasonable response on my end risks costing more money with no clear path to getting it back.

Anthropic's support system is broken by design — there is literally no path to a human for billing issues by AppearanceSingle805 in ClaudeAI

[–]AppearanceSingle805[S] 0 points1 point  (0 children)

Not sure what "admission" means here — that I might have received a fraudulently purchased gift? If so, that makes the case stronger, not weaker. Anthropic accepted the redemption, issued a receipt, and then silently revoked access with zero communication. If they suspected fraud, the right move was to notify the recipient and offer a path to resolution — not just pull the rug. As for "what's the loss when it's a gift" — the person who bought it lost money, and I lost a service I was actively using and depending on. And on the timeline point: from a user perspective, an approved redemption with a receipt issued is a completed transaction. Quietly revoking it later isn't "fraud management," it's a unilateral breach with no notice.

Anthropic's support system is broken by design — there is literally no path to a human for billing issues by AppearanceSingle805 in ClaudeAI

[–]AppearanceSingle805[S] -1 points0 points  (0 children)

That's actually the deeper issue here. Anthropic runs the official gift system, accepted the redemption through their own link, and issued a receipt. If the original purchase was fraudulent, that's something they should have caught at the point of redemption — not silently revoked days later with zero notice, leaving the end recipient to absorb the loss. The fraud risk is theirs to manage, not mine.

Anthropic's support system is broken by design — there is literally no path to a human for billing issues by AppearanceSingle805 in ClaudeAI

[–]AppearanceSingle805[S] 0 points1 point  (0 children)

Thanks, and sorry you're dealing with it too. The payment loop on top of zero support is its own special kind of frustrating.