Gate News message, April 23 — Tencent Cloud Security Center disclosed a supply chain poisoning vulnerability in Xinference. The flaw could allow attackers to steal sensitive information—including cloud credentials, API keys, SSH keys, encrypted wallets, database credentials, and environment variables—when users install or import affected package versions. Stolen data would be transmitted to remote command and control (C2) servers.
Tencent Cloud Security recommends users conduct immediate security audits and apply updates if their systems fall within the affected range to prevent unauthorized access.
Related News
CometBFT zero-day vulnerability exposed, $8.0 billion Cosmos network nodes face a risk of permanent lockup
Volo Protocol vault attacked, losses totaling 3.5 million, remaining TVL confirmed to be safe
Vercel and GitHub confirm npm supply chain security; packages have not been tampered with