This Week's Pattern: Your Supply Chain Is Your Attack Surface.

A widely-used open-source JavaScript library — TanStack — was compromised this week. Two OpenAI employees had their devices breached through it. Apple had to push macOS security updates. Grafana was breached not because of a flaw in Grafana itself, but because a token rotation step was missed after the TanStack event. GitHub confirmed 4,000 internal repositories were stolen. And CISA — the US government's own cybersecurity agency — had credentials to AWS GovCloud environments leaking from its public GitHub account.

Five separate incidents. One mechanism: something you trusted, built by someone else, holding a key to something important — and nobody noticed until the data was already out the door.

The AI layer adds a new dimension. Hackers in Latin America are now generating custom attack tools in real time using AI agents — adapting their malware on the fly to each new target environment. A new vulnerability class called OpenClaw "Claw Chain" enables full AI agent takeover. And enterprises are deploying AI agents faster than their identity security teams can govern them.

Here's what happened, why the supply chain pattern keeps winning, and what RuntimeAI enforces against each class.

Supply Chain Attacks

1 — TanStack Supply Chain Attack Compromises Two OpenAI Employee Devices

1 TanStack — Malicious Package Compromises OpenAI Employees, Forces macOS Updates CRITICAL · SUPPLY CHAIN
The Hacker News · May 19, 2026 · npm supply chain · OpenAI, Apple macOS

Attackers injected malicious code into TanStack, a widely-used JavaScript library for data management in React applications. The compromise reached two OpenAI employee devices, extracting credentials and session tokens from their development environments. The severity of the downstream blast radius forced Apple to push emergency macOS security updates — an extraordinary escalation from a single npm package compromise. TanStack is used by thousands of enterprises in production web applications.

TanStack is not some obscure package maintained by one developer in a spare bedroom. It is a mature, widely-starred, enterprise-grade library used in production by companies you have heard of. The supply chain attack surface is not your vendors' worst libraries. It is their best ones. The ones that are so trusted, nobody scrutinizes the update.

The OpenAI angle is particularly instructive. The two employees compromised were almost certainly developers — people who install npm packages as reflexively as drinking coffee. Their devices held credentials that mattered enough to force an Apple macOS update. The blast radius of one developer's npm install now extends to the devices of an AI frontier lab and to the OS update infrastructure of the world's largest consumer hardware company.

Most Advanced AI Security Zero Trust · Defence in Depth

Supply chain attacks succeed because the install step is trusted and the execution environment is open. RuntimeAI constrains both:

The supply chain is not patchable. The execution environment around it is governable.

2 — GitHub Confirms Breach: 4,000 Internal Repositories Stolen

2 GitHub — 4,000 Internal Repos Exfiltrated in Confirmed Breach CRITICAL · CODE INTEGRITY
Dark Reading · May 19, 2026 · Source code integrity · Microsoft / GitHub

GitHub confirmed that attackers exfiltrated approximately 4,000 internal repositories. The scope of the stolen code has not been fully disclosed, but internal repositories at a platform that hosts the world's software supply chain — and whose Actions runners execute in the CI pipelines of millions of projects — represent a categorically different level of risk than an ordinary corporate code breach. Any secrets, tokens, or supply-chain hooks present in those repos are now in attacker hands.

GitHub is infrastructure for the global software supply chain. When GitHub's internal repos leak, the question is not "what did attackers get." The question is "what was in those repos that attackers can now use to compromise downstream targets." Secrets in internal repos. Undisclosed vulnerability data. CI/CD runner configurations. Service account tokens. Any of these, extracted from 4,000 repos, could fuel a multi-year downstream attack campaign that looks like normal CI activity from the outside.

Most Advanced AI Security Zero Trust, Layer by Layer

Code repository breaches are dangerous because the data inside is inherently trusted — it was put there by your own engineers. RuntimeAI enforces at the data layer, not the perimeter:

Your code repo is not just your IP. It is the key to your entire delivery pipeline. Govern what it can reach.

3 — Grafana Breached via Missed Token Rotation After TanStack Attack

3 Grafana — Breach Caused by Missed Token Rotation Following TanStack Compromise HIGH · CREDENTIAL LIFECYCLE
Bleeping Computer · May 19, 2026 · NHI / credential hygiene · Grafana Labs

Grafana Labs disclosed a breach caused not by a novel attack but by a procedural failure: a token that should have been rotated following the TanStack supply chain event was not. An attacker with the unrotated token used it to gain access to Grafana's internal systems. The breach is a textbook example of how supply chain incidents create a mandatory rotation window — and how failing to complete that rotation within the window converts a near-miss into a confirmed breach.

This is the second-order consequence of supply chain attacks that almost nobody talks about. The TanStack incident created a list of "tokens that may have been exposed" at every company running TanStack. Grafana had such a token. They either did not identify it, or identified it and did not rotate it in time. The result: a breach that had nothing to do with Grafana's own security posture and everything to do with the gap between "we know we should rotate" and "we actually rotated."

Every major supply chain event generates this list. Most of those lists never get fully actioned. The attackers know this and they wait.

Most Advanced AI Security How RuntimeAI Stops This

The missed-rotation problem is a process failure, but it is also a visibility failure. RuntimeAI addresses both:

The supply chain event is the trigger. The rotation window is the race. RuntimeAI wins that race automatically.

Secrets & Credentials

4 — CISA GitHub Leak Exposes AWS GovCloud Secrets

4 CISA — AWS GovCloud Credentials Leaked via Public GitHub Repository CRITICAL · SECRETS LEAK
eSecurity Planet · May 19, 2026 · Government cloud security · CISA / AWS GovCloud

CISA's own GitHub account contained credentials that exposed access to AWS GovCloud environments — the cloud infrastructure used by US federal agencies for sensitive but unclassified workloads. The secrets were present in a public-facing repository, discoverable by anyone with a GitHub account and a basic secrets scanner. CISA is the federal agency responsible for advising other agencies on exactly this class of vulnerability.

The CISA leak is the security industry's recurring cautionary tale, now starring the cautioner. If the agency that publishes advisories about GitHub secrets exposure has GitHub secrets exposure, the implicit assumption that "we would know if we had this problem" is demonstrably false for every organization below CISA's security maturity level — which is most of them. Secrets scanning is not a one-time action. It is a continuous control. The repo that is clean today has a commit tomorrow.

Most Advanced AI Security Why RuntimeAI Customers Are Protected

The CISA scenario — secret committed, not caught, sitting in public — requires a continuous scanning posture, not a quarterly audit. RuntimeAI enforces it:

Every organization has a CISA scenario waiting to happen. RuntimeAI closes the window before it opens.

AI Agent Exploits

5 — OpenClaw "Claw Chain" Vulnerabilities Enable Full AI Agent Takeover

5 OpenClaw — "Claw Chain" Class Enables Complete AI Agent Hijacking CRITICAL · AI AGENT TAKEOVER
Dark Reading, eSecurity Planet · May 19, 2026 · AI agent security · OpenClaw deployments

Researchers disclosed a new vulnerability class they named "Claw Chain" affecting OpenClaw deployments — a chained sequence of weaknesses that allows an attacker to fully take over an AI agent's execution context, override its system prompt, redirect its tool calls, and exfiltrate the entire context window including any secrets or PII the agent has processed. The attack requires no authenticated access to the agent's host — only the ability to inject content into the agent's input stream, which in typical deployments is trivially achievable via user-controlled inputs.

Claw Chain is structurally similar to prompt injection, but more severe: it does not just manipulate what the agent says — it takes over what the agent does. Tool calls, API requests, file reads, and database queries all become attacker-controlled once the chain is triggered. Every enterprise running an AI agent that processes user-provided content — which is essentially every enterprise running an AI agent — has a potential Claw Chain surface.

The practical consequence: an AI agent with database access, internal API access, or file system access is now equivalent to a remotely-exploitable RCE vulnerability in your environment. The agent is the exploit surface.

Most Advanced AI Security How RuntimeAI Stops This

Claw Chain exploits the assumption that the agent's execution context is trustworthy. RuntimeAI replaces that assumption with continuous enforcement:

The agent is not a user. It should not have user-level trust. RuntimeAI enforces the boundary at the tool-call level.

Vulnerability & Auth Bypass

6 — SonicWall VPN MFA Bypassed Due to Incomplete Patching

6 SonicWall — Attackers Bypass MFA on VPN via Incomplete Patch Application HIGH · AUTH BYPASS
Bleeping Computer · May 19, 2026 · VPN security · SonicWall SSLVPN

Attackers bypassed multi-factor authentication on SonicWall SSLVPN deployments because organizations had applied the security update but not the complete patch set. SonicWall had released a follow-on patch that addressed a remaining authentication bypass vector; organizations that applied the initial fix but not the second were still vulnerable. The incomplete patch scenario is a recurring failure mode in enterprise patch management — one update ships, the second is not tracked, the vulnerability persists.

The SonicWall story is a manifestation of the same gap as the Grafana token story: knowing you should take an action and actually completing it are two different things at enterprise scale. In Grafana's case it was token rotation. Here it is a two-part patch. Patch management at enterprise scale is not "we deployed the update." It is "we verified the complete remediation was applied and we can prove it." Most organizations can do the former. Far fewer can do the latter.

Most Advanced AI Security Zero Trust, Layer by Layer

MFA bypass via incomplete patching is a network perimeter failure, but it is also a posture visibility failure. RuntimeAI enforces at both layers:

The perimeter will always have incomplete patches. Zero trust means the interior does not depend on the perimeter being complete.

AI-Powered Offense

7 — LatAm Hackers Generate Custom Attack Tools on the Fly Using AI Agents

7 LatAm Threat Actors — AI Agents Generating Bespoke Malware Per Target in Real Time HIGH · AI-POWERED OFFENSE
Dark Reading · May 19, 2026 · Threat intelligence · LatAm cybercriminal groups

Researchers documented Latin American hacking groups using AI agent frameworks to generate custom attack tools in real time — tailored to each specific target environment's observed defenses, software stack, and network topology. Rather than deploying a static malware payload, these groups prompt AI agents during the attack to produce novel evasion techniques, adapted exploit code, and target-specific phishing lures. The result is a generative arms race: traditional signature-based detection becomes ineffective against malware that has never existed before the moment of deployment.

The phrase "AI democratizes attack capability" has been abstract for the past two years. It is no longer abstract. When a mid-tier criminal group in Latin America is generating bespoke exploit code tuned to your specific environment — not deploying a commodity RAT, but writing a new one as they move through your network — the assumption that "our EDR has signatures for this" fails by design. The defense cannot be reactive to tools that did not exist an hour ago. The defense has to be behavioral.

Most Advanced AI Security How RuntimeAI Stops This

Signature-based detection loses to generative attacks. Behaviour-based enforcement does not — because the attacker's actions remain constrained regardless of how novel the tool:

The offense is generative. The defense has to be structural. RuntimeAI builds structure at the control plane level — not the tool level.

AI Agent Governance

8 — AI Agents Outpacing Identity Security: Budget Dynamics Are Shifting

8 Enterprise AI Agents — Deployed Faster Than Identity Security Can Govern HIGH · GOVERNANCE GAP
Dark Reading · May 19, 2026 · Identity security · AI agent governance

Identity security leaders report that AI agents are now the fastest-growing category of non-human identity in enterprise environments — and the category with the least governance coverage. AI assistants, IDE plugins, and agentic workflows quietly accumulate OAuth grants, service account bindings, and API credentials as they are deployed. Security teams that have mature controls for human identities are discovering that those controls do not extend to agents that impersonate their humans, inherit their access, and operate at machine speed. Budget is beginning to shift toward AI-specific identity controls for the first time.

The governance gap between "we deployed this agent" and "we know what this agent can do on our behalf" is the foundational security risk of the current AI deployment wave. Every agent that a developer spins up with their own OAuth grant is a new machine identity with human-level access and no human-level accountability. When the Claw Chain attack from incident #5 fires against such an agent, the blast radius is not the agent's — it is the human whose credentials it inherited.

Most Advanced AI Security Why RuntimeAI Customers Are Protected

The governance gap exists because identity controls were designed for humans-using-tools, not autonomous-agents-using-everything. RuntimeAI was built for the second world:

The identity perimeter of the enterprise now includes every AI agent it runs. RuntimeAI is the control plane for that perimeter.

Competitor Watch

9 — Microsoft Open-Sources RAMPART and Clarity to Secure AI Agents

9 Microsoft — RAMPART & Clarity Open-Sourced for AI Agent Security Testing MEDIUM · COMPETITOR MOVE COMPETITOR INCIDENT
The Hacker News, Help Net Security · May 21, 2026 · AI agent security · Microsoft

Microsoft open-sourced RAMPART — a red-teaming framework for testing AI agent security — and Clarity, a tool for designing AI agent architectures with security properties. Both are positioned as developer-facing tools to help enterprises evaluate AI agent deployments before they go to production. The release marks Microsoft's first major public acknowledgment that AI agent security requires dedicated tooling beyond what existing security products provide.

Microsoft open-sourcing agent security tooling is a signal, not a solution. RAMPART and Clarity are testing and design tools — they help you find problems in an agent before deployment. They do not enforce controls at runtime. An agent that passes RAMPART's red-team tests and is designed with Clarity's guidance is still unprotected once it is deployed and begins processing real inputs from real users in a real environment where adversaries can inject Claw Chain attacks, supply chain compromises, and AI-generated exploit code.

The open-source release is valuable for the industry's understanding of the problem space. It does not compete with a deployed runtime control plane. It is the diagnostic tool; RuntimeAI is the treatment.

Most Advanced AI Security Why RuntimeAI Customers Are Protected

Pre-deployment testing identifies known weaknesses. Runtime enforcement handles the unknown ones — and the adversarially adaptive ones:

Testing is necessary. Runtime enforcement is what keeps you safe after the test ends.

Industry

10 — Verizon DBIR 2026: Enterprises Face a Dangerous Vulnerability Glut

10 Verizon DBIR 2026 — Vulnerability Exploitation Outpacing Enterprise Remediation Capacity HIGH · INDUSTRY TREND
Dark Reading · May 19, 2026 · Industry · Verizon Data Breach Investigations Report 2026

The Verizon 2026 DBIR reports that enterprises now face a structural vulnerability glut: the volume of published CVEs exceeds the remediation capacity of most security and engineering teams by a widening margin. Median time to exploit after CVE publication continues to compress. The combination — more vulnerabilities, faster exploitation, unchanged remediation velocity — means the average enterprise is running an increasing number of unpatched, actively-exploited vulnerabilities at any given moment. Credential theft and exploitation of public-facing applications account for the majority of breaches.

The DBIR's message in 2026 is the same as in 2020 and 2015, only louder: the volume-of-vulnerabilities problem is not being solved by adding more analysts. The math does not work. The only sustainable response is to change what "unpatched" means — to ensure that an unpatched vulnerability in a publicly-facing service cannot be used to reach the data and systems that actually matter. That is a zero-trust architecture problem, not a patch velocity problem.

Most Advanced AI Security Zero Trust · Defence in Depth

RuntimeAI does not solve the vulnerability volume problem. It changes what happens when a vulnerability is exploited — which is the only lever that scales:

The vulnerability glut is real and it is not going away. RuntimeAI makes the glut operationally manageable by changing what exploitation actually yields.

🔍 This Week's Through-Line: The Supply Chain Is the Attack Surface

TanStack. GitHub. Grafana. CISA. Four of this week's ten incidents trace directly to the software supply chain — a trusted component, a trusted repo, a trusted token — where the trust was never re-examined after it was granted.

The AI layer amplifies this: AI agents inherit supply chain dependencies at the same rate as the applications they're built on. An agent that loads a compromised library, runs a workflow that touches a breached repository, or uses a token that was never rotated inherits the supply chain's blast radius.

RuntimeAI's approach: continuous inventory of every component in the supply chain that touches an AI agent's execution context, automatic rotation triggers on compromise events, and behavioral enforcement that contains the damage when the supply chain fails — which it will. The supply chain is your attack surface. Govern it like one.

Get the Weekly Digest

Ten cybersecurity incidents per week, each with the RuntimeAI Take. No fluff, no vendor pitches in the analysis itself — just what happened, why, and what to enforce against next.