
Introduction The security of the software supply chain has taken a sophisticated turn as attackers now repurpose reputable AI infrastructure to camouflage the clandestine movement of stolen data from developer machines. This incident involves a deceptive npm package titled js-logger-pack, which functioned not merely as a piece of malware but as a bridge between a victim’s local environment and the










