Fake Gemini npm Package Steals AI Tool Tokens
A malicious npm package published March 20, 2026 — gemini-ai-checker, under the account gemini-check — posed as a Google Gemini token verifier and contained a hidden payload that harvested authentication tokens, files, and credentials from developer environments. The trojanized package targeted dev workflows that integrate AI coding assistants and IDE plugins, exfiltrating secrets tied to Claude, Cursor, Windsurf, PearAI and other tools. The package’s README was copied from an unrelated library (chai-await-async), a mismatch that should have raised red flags; the payload was loaded dynamically from a Vercel-hosted endpoint. This is a supply-chain compromise aimed at developers using JavaScript tooling and AI integrations — practitioners must audit dependencies, pin trusted packages, and monitor for unexpected network calls from build-time or CLI helpers.
Scoring Rationale
This is a notable supply-chain attack that directly affects developer workflows and tokens for AI tools — a material risk practitioners must address. It isn’t a broad industry-defining event but is highly relevant for engineering teams using npm and AI integrations.
Practice interview problems based on real data
1,500+ SQL & Python problems across 15 industry datasets — the exact type of data you work with.
Try 250 free problemsStep-by-step roadmaps from zero to job-ready — curated courses, salary data, and the exact learning order that gets you hired.
Sources
- Read Original?Hackers Use Fake Gemini npm Package to Steal Tokens From Claude, Cursor, and Other AI Tools