Clinejection: How a GitHub Issue Title Compromised 4,000 Developer Machines via AI Prompt Injection
A five-step supply chain attack dubbed "Clinejection" compromised 4,000 developer machines in February 2026 after a malicious GitHub issue title injected a prompt into Cline's AI triage bot, eventually leading to the theft of npm, VS Code Marketplace, and OpenVSX publish tokens. The attacker published a backdoored cline@2.3.0 to npm that silently installed OpenClaw — a separate AI agent with full system access and persistent daemon capabilities — on every machine that updated Cline during an eight-hour window. Cline's post-mortem has since migrated to OIDC provenance attestations for npm publishing and eliminated long-lived tokens, but the attack exposed a structural gap in how AI agents in CI/CD pipelines handle untrusted natural-language input.
Key Takeaways
- cline@2.3.0 (npm) contained a postinstall hook installing OpenClaw globally; package was live for ~8 hours with ~4,000 downloads before removal on Feb 17, 2026
- Attack chain: prompt injection via GitHub issue title → AI bot executes arbitrary npm install → GitHub Actions cache poisoning → credential theft (NPM_RELEASE_TOKEN, VSCE_PAT, OVSX_PAT) → malicious publish
- Cline remediation: eliminated Actions cache from credential workflows, adopted OIDC npm provenance attestations, added credential rotation verification, and commissioned third-party CI/CD security audits
Original source: Grith