Sixty seconds. That is roughly how long an attacker who has seized a maintainer’s npm credentials needs to push a malicious package version to a registry that serves, at last count, more than 2.5 million unique packages and processes upward of 80 billion downloads per month. The window is not a metaphor. It is a measurement — and the TanStack incident earlier this year made it concrete in ways that boardroom risk registers have not yet absorbed.

How a Single Token Became a Blast Radius
TanStack is not a household name outside of web development, but its libraries — Query, Router, Table, among others — are embedded in production applications across fintech, healthcare, and enterprise SaaS. When its npm publishing account was briefly compromised, the immediate question was not whether malicious code had shipped. The more unsettling question was how long it had taken anyone to notice that the account had changed hands at all.
The answer, reconstructed from public post-mortems and community threads, was: not immediately. That delay echoes a broader pattern. Research into enterprise breach timelines consistently shows that most intrusions go undetected for weeks to months, with attackers exploiting gaps in centralized logging and the absence of proactive monitoring to move quietly through systems. In a software supply chain context, “quietly” can mean a poisoned dependency sitting in a build pipeline for an entire release cycle before anyone runs a hash check.
The mechanics here matter for anyone trying to understand the real exposure. npm’s publishing model was designed for velocity, not verification. A maintainer token — often a long-lived credential stored in a CI/CD environment variable — grants direct write access to a package’s release history. There is no mandatory code review gate, no second-factor confirmation on publish actions by default, and historically, no real-time behavioral alert when a new version is pushed from an IP address that has never been associated with that maintainer. The 60-second window is not a flaw in npm specifically. It is the natural consequence of optimizing a system for developer convenience at scale.
The Logging Gap That Made Detection Slow
What the TanStack episode surfaced — and what most post-incident analyses underplay — is that supply chain security npm incident response fails at the detection layer before it ever reaches the remediation layer. According to OWASP’s cataloguing of security logging and monitoring failures, the absence of centralized, queryable logs for authentication events is among the most persistently exploited weaknesses in modern application security. It ranked in the OWASP Top 10 not because it is exotic, but because it is ordinary.
Apply that to the npm ecosystem: a maintainer account executing an unusual publish action — different geolocation, different device fingerprint, outside normal commit cadence — generates a signal. Whether that signal is captured, correlated, and acted upon within minutes rather than days is entirely a function of whether someone built the logging infrastructure to catch it. In the TanStack case, and in the broader pattern Radware has documented around logging failures, the gap was not technical impossibility. It was organizational priority. Nobody had assigned the 3 a.m. alert.
Here is the part that should concern you directly: if you are a CTO whose team ships any product that pulls from the npm registry — and the odds are overwhelming that you are — your runtime application almost certainly has a transitive dependency on a package maintained by a single person, with a single token, and no hardware security key requirement. The npm registry’s own data suggests that a significant proportion of the most-downloaded packages are maintained by individuals rather than organizations. Sole maintainership is not a fringe condition; it is the default.
Zero-Days Are Glamorous; Credential Theft Is the Actual Threat
The security industry has a fixation on zero-day vulnerabilities that distorts how organizations allocate attention. Analysis of zero-day exploitation patterns confirms that these vulnerabilities, while serious, represent a fraction of successful attacks compared to the mundane compromise of valid credentials and session tokens. The TanStack incident was not a zero-day. It was a stolen or leaked publishing token — the supply chain equivalent of a copied key rather than a broken lock.
That distinction matters enormously for how organizations budget and where security engineering time goes. A team that has invested heavily in static analysis, container scanning, and SBOM generation — all genuinely valuable — may have done almost nothing to verify that the upstream maintainer of a critical dependency has multi-factor authentication enabled on their npm account. The former work is visible, auditable, and defensible in a board presentation. The latter is invisible until it isn’t.
Supply chain security npm incident response as a discipline has matured considerably since the 2021 wave of malicious package publications that poisoned ua-parser-js and several other widely-used libraries. npm now offers granular publish access tokens, two-factor requirements for high-impact packages, and package provenance attestation through Sigstore. GitHub’s dependency graph surfaces known vulnerabilities in the dependency tree. These are real advances. And yet the TanStack incident happened after all of them were available — because availability and adoption are not the same thing.
What the Research Community and Educators Are Getting Wrong
There is a curriculum problem embedded in this story that rarely surfaces in the incident post-mortems. University computer science programs, coding bootcamps, and developer certification tracks teach dependency management as a convenience abstraction. Students learn to run npm install; they are not routinely taught to audit what they are installing, verify package provenance, or understand what a compromised transitive dependency would look like in their build logs. The result is a generation of engineers who are fluent in using the ecosystem and largely blind to its trust assumptions.
For independent developers — the freelancers, the open-source contributors, the solo founders — the asymmetry is starker. They maintain packages that may accumulate hundreds of thousands of weekly downloads while operating with no security team, no incident response playbook, and often no organizational memory of how their publishing token was generated or where it is stored. The pressure to ship and maintain is real; the incentive to harden account security is abstract until the moment it becomes catastrophic. Supply chain security npm incident response frameworks designed for enterprise SOC teams simply do not translate to the maintainer working alone at midnight on a library they originally wrote for themselves.
The 60-Second Window Is Actually Three Windows
The “60 seconds to publish” framing is accurate but incomplete. The real exposure is a sequence. First, the credential compromise window: the period between token theft and first malicious use, which may be hours or days as attackers stage their operation. Second, the publish window — measured in seconds — where a malicious version enters the registry. Third, and most consequential, the propagation window: the time between publication and the moment downstream build systems pull the compromised version, which in environments with automated dependency updates can be measured in minutes.
It is in that third window where effective supply chain security npm incident response either exists or doesn’t. Organizations that have implemented real-time SBOM monitoring, registry mirrors with integrity verification, or automated alerts on dependency version bumps have a fighting chance to catch the propagation before it reaches production. Organizations relying on periodic vulnerability scans do not — and the majority of organizations, by any honest accounting, fall into the second category.
Whether the TanStack maintainers had any of those controls in place is not publicly confirmed. That uncertainty is itself the finding.
The Moat Question Investors Are Asking the Wrong Way
From a competitive and investment perspective, the TanStack incident is a stress test of the open-source-as-infrastructure thesis that has underpinned a decade of venture bets on developer tooling companies. The argument has always been that community trust is a durable moat — that the network effects of widespread adoption make switching costly enough to justify enterprise pricing. The TanStack library ecosystem has real adoption moats. But supply chain incidents erode trust at a speed that adoption curves cannot easily absorb.
One compromised publish event — even one caught quickly, even one where no malicious code ultimately ran in production — changes the conversation in procurement meetings. Enterprise security teams now ask about supply chain security npm incident response posture as a vendor qualification criterion, not an afterthought. The open-source projects that will hold their institutional adoption over the next five years are the ones that treat security process as a product feature, not a maintenance burden.
“The honest answer is that most open-source maintainers have never written an incident response plan, and most of the organizations consuming their work have never asked them to.”
— Senior security engineer at a cloud infrastructure provider
There is a version of this story where npm’s provenance tooling, Sigstore adoption, and registry-level behavioral monitoring close the window entirely. That version assumes coordinated adoption across hundreds of thousands of independent maintainers, enterprise security teams consistently requiring attestation as a procurement condition, and educational institutions updating curricula fast enough to matter. Each of those assumptions is individually plausible. Together, they require a pace of institutional change that the security ecosystem has rarely demonstrated.
The TanStack account has been secured. The packages are clean. The incident, measured purely by damage done, may end up a footnote. But the 60-second window it illuminated is still open, right now, in thousands of other maintainer accounts — and the monitoring infrastructure to catch the next one is still, in most organizations, an item on next quarter’s roadmap.
FetchLogic Take
Within 18 months, at least one major enterprise software vendor will make Sigstore-based package provenance attestation a hard contractual requirement for third-party open-source dependencies, triggering an industry-wide audit of which widely-used npm packages can actually produce a verifiable build chain. The projects that cannot will face either rapid maintainer consolidation under funded organizations or quiet deprecation in enterprise environments — regardless of download counts. The winnowing of the open-source dependency graph has begun; this incident is one of the early data points that will be cited when it accelerates.
Related Analysis
Amazon’s AI Mandate Is Backfiring: Workers Are Gaming the MetricsMay 16, 2026
Amazon’s AI Mandate Is Breeding a Culture of Productive-Looking NoiseMay 15, 2026
Amazon’s Token Trap: What ‘Tokenmaxxing’ Reveals About the Limits of Mandated AI AdoptionMay 13, 2026
Meta’s $50B AI Bet Is Burning Out the People Building ItMay 10, 2026