NPM’s Token Farming Flood: Inside the 150,000-Package Assault on Open-Source Security

Security researchers uncovered over 150,000 function-less npm packages in a massive token farming scheme targeting tea.xyz rewards, marking one of the largest open-source registry floods. Amazon Inspector led the detection, highlighting evolving supply chain risks in 2025.
NPM’s Token Farming Flood: Inside the 150,000-Package Assault on Open-Source Security
Written by Victoria Mossi

In the sprawling ecosystem of open-source software, where millions of developers rely on shared code repositories, a new threat has emerged with unprecedented scale. Security researchers have uncovered what Amazon Web Services describes as one of the largest package flooding incidents in history, involving over 150,000 function-less packages uploaded to the npm registry. This automated scheme, dubbed ‘token farming,’ targeted the tea.xyz protocol, aiming to exploit cryptocurrency rewards rather than traditional malware injection.

The attack, detailed in reports from AWS Security Blog and Dark Reading, involved self-replicating packages that generated and propagated new ones without any functional code. Unlike typical supply chain attacks that inject malicious payloads, these packages were designed to farm tokens by simulating activity within the tea.xyz blockchain ecosystem. Researchers at Amazon Inspector identified the flood, which began overwhelming the npm registry in late October 2025, leading to a rapid response from npm maintainers.

According to Slashdot, the packages were devoid of meaningful functionality, serving solely as vessels for token accumulation. This twist on traditional attacks highlights a shift toward economic exploitation in open-source vulnerabilities, where attackers leverage registry mechanics for financial gain rather than data theft or system compromise.

The Mechanics of Token Farming

At its core, token farming exploits protocols like tea.xyz, which reward users for contributions to open-source projects. The attackers automated the creation of npm packages, each linking back to tea.xyz to claim rewards. As reported by The Register, this self-replicating nature allowed the scheme to balloon to 150,000 packages in a short period, described as a ‘tidal wave’ by Dark Reading.

Amazon Inspector’s detection tools flagged these anomalies, revealing patterns of automated uploads from suspicious accounts. ‘This is one of the largest package flooding incidents in open source registry history, and represents a defining moment in supply chain security,’ stated the AWS Security Blog in their November 14, 2025, post (AWS Security Blog).

Cyber Insider elaborated that the packages were tied to a coordinated cryptocurrency farming effort, with no immediate harm to end-users but significant strain on the registry’s infrastructure. This method contrasts with past incidents like the 2024 npm hijackings, where phishing led to malware in popular libraries.

npm’s Evolving Security Landscape

In response to growing threats, npm has implemented stricter authentication measures. A GitHub Changelog from September 29, 2025, announced changes to token management, including the deprecation of classic tokens and shorter lifetimes for granular ones (GitHub Changelog). These updates aim to mitigate automated abuses like token farming.

However, the recent flood underscores persistent vulnerabilities. RedPacket Security noted that the attack ‘poisoned’ over 150,000 packages, echoing Amazon’s description of it as a massive supply chain compromise (RedPacket Security). Industry insiders point out that npm’s open nature, while fostering innovation, invites such exploits.

Posts on X (formerly Twitter) from users like Dark Web Informer and Florian Roth highlight community alarm, with discussions of similar past compromises affecting billions of downloads. One post referenced a 2017 incident where a single person harvested credentials for 52% of Node packages, underscoring long-standing risks.

Impacts on Developers and Ecosystems

For developers, the influx of junk packages complicates dependency management. Tools like npm install could inadvertently pull in these function-less entities, bloating projects and potentially triggering security alerts. Slashdot’s coverage emphasized the automated nature, quoting The Register: ‘Yet another supply chain attack has hit the npm registry in what Amazon describes as “one of the largest package flooding incidents in open source registry history”‘ (Slashdot).

Broader implications extend to blockchain-integrated open-source tools. Tea.xyz’s reward system, intended to incentivize contributions, became a vector for abuse. Security experts warn that similar schemes could target other registries like PyPI or RubyGems, as noted in Dark Reading’s analysis (Dark Reading).

Amazon’s rapid reporting and npm’s takedown efforts mitigated immediate damage, but the incident has sparked calls for enhanced AI-driven monitoring. ‘This represents a defining moment in supply chain security, far surpassing the initial 15,000 packages reported by Sonatype,’ per AWS Security Blog.

Lessons from Past Attacks

Historical context reveals a pattern of npm vulnerabilities. A November 5, 2025, GitHub update disabled classic token creation to bolster security (GitHub Changelog). Earlier, in September 2025, phishing compromised packages with 2 billion weekly downloads, as posted on X by Hackmanac.

Comparisons to the 2024 React Native flaw (CVE-2025-11953), covered by SecurityWeek, show how command execution vulnerabilities persist (SecurityWeek). Token farming adds a financial dimension, blending cybercrime with crypto speculation.

Industry responses include migration guides, like Bybowu’s playbook for npm token changes by November 19, 2025 (Bybowu). Developers are urged to adopt OIDC trusted publishing to avoid outages.

Future Safeguards and Industry Shifts

To combat such threats, experts advocate for multi-layered defenses. Medium articles by Dhanush N discuss npm’s security upgrades, emphasizing shorter token lifetimes (Medium). Automated detection, as demonstrated by Amazon Inspector, will be crucial.

The incident has fueled debates on decentralizing registries or integrating blockchain more securely. X posts from FryAI and Pure Tech News reflect growing awareness, with sentiments labeling it a ‘cyber threat’ to npm’s integrity.

As open-source continues to underpin global software, this token farming scheme serves as a wake-up call. Strengthening authentication, monitoring uploads, and educating maintainers will be key to preventing future floods.

Broader Economic Incentives in Cyber Attacks

Beyond technical fixes, understanding the economic drivers is essential. Token farming exploits reward systems, similar to airdrop farming lists shared on X by Faycy, listing protocols like Monad and Berachain for 2025 rewards.

LexBlog’s coverage ties this to a ‘tidal wave’ of malicious packages, crediting Dark Reading (LexBlog). The fusion of crypto and open-source creates new attack surfaces.

Ultimately, collaboration between registries, security firms, and developers will define the response. As npm evolves, so too must the strategies to protect it from innovative threats like token farming.

Subscribe for Updates

CybersecurityUpdate Newsletter

The CybersecurityUpdate Email Newsletter is your essential source for the latest in cybersecurity news, threat intelligence, and risk management strategies. Perfect for IT security professionals and business leaders focused on protecting their organizations.

By signing up for our newsletter you agree to receive content related to ientry.com / webpronews.com and our affiliate partners. For additional information refer to our terms of service.

Notice an error?

Help us improve our content by reporting any issues you find.

Get the WebProNews newsletter delivered to your inbox

Get the free daily newsletter read by decision makers

Subscribe
Advertise with Us

Ready to get started?

Get our media kit

Advertise with Us