-
-
Notifications
You must be signed in to change notification settings - Fork 5
Open
Labels
enhancementNew feature or requestNew feature or request
Description
What problem do you want to solve?
Recent supply chain attacks on npm have highlighted the need for stronger package publishing security. The September 2025 Shai-Hulud worm compromised 500+ packages through stolen maintainer tokens, showing the risks of token-based publishing.
Trusted publishing helps by eliminating long-lived tokens that can be stolen or accidentally exposed; generating automatic provenance provides cryptographic proof of where/how packages are built; and is an industry standard adopted by PyPI, RubyGems, crates.io, NuGet, etc.
What do you think is the correct solution?
Here's the short version:
- Configure a trusted publisher on npmjs.com
- Add
id-token: writepermission to your workflow - Remove
NODE_AUTH_TOKENfrom your workflow
npm is planning to deprecate legacy tokens and make trusted publishing the preferred method.
Would you consider adopting trusted publishing to help secure the npm ecosystem?
Participation
- I am willing to submit a pull request for this change.
Additional comments
References:
Metadata
Metadata
Assignees
Labels
enhancementNew feature or requestNew feature or request