Glassworm Supply-Chain Attack Returns: 151+ GitHub Repos Hit with Invisible Unicode Malware

Aikido Security discovered a new wave of the Glassworm supply-chain attack campaign hitting 151+ GitHub repositories, npm packages, and VS Code extensions between March 3-9. Attackers embed invisible Unicode characters that evade visual code review and execute malicious payloads via JavaScript eval(). The campaign targets high-value repositories including Wasmer, Reworm, and OpenCode, using AI-generated commits for camouflage.

Key Takeaways

  • 151+ GitHub repositories compromised with invisible Unicode injection (FE00-FE0F and E0100-E01EF character ranges)
  • Attack also hit npm (@aifabrix/miso-client v4.7.2, @iflow-mcp/watercrawl 1.3.0-1.3.4) and VS Code (quartz.quartz-markdown-editor v0.3.0)
  • Attackers use AI-generated commits with realistic documentation tweaks and bug fixes to blend into project history

Original source: Aikido Security