Wolves In The Repository: Fake GitHub Forks Are Now The Fake Grain, And The Flock Is Eating It

Wolves In The Repository: Fake GitHub Forks Are Now The Fake Grain, And The Flock Is Eating It

I have been warning about supply chain contamination since before most of your current "senior engineers" were in secondary school. And yet, here we are. Again.

A campaign called SmartLoader, which I refuse to find impressive despite its operational competence, has been caught distributing a credential-stealing parasite called StealC through a trojanized version of the Oura MCP server. The delivery mechanism is a fraudulent GitHub fork. A fake repository. A counterfeit barn, if you will.

The flock walks in. The flock gets fleas. This is not complicated.

The wolves here understood something fundamental: the lambs trust anything wearing a GitHub badge. They trust it the way my graduate students trust a Wikipedia citation, which is to say, completely and without shame. The fake fork looked legitimate. It was not. The parasites deployed quietly, and suddenly your credentials and your cryptocurrency are on a one-way ticket to somewhere unpleasant.

Now, I want to address the Sky Pasture angle here, because MCP servers and AI tooling infrastructure are increasingly living up there in that suspicious, unaccountable vapor. Nobody knows where the actual fence is. Nobody knows who is minding the gate. In the old days, your software came on physical media. You knew what you installed. You could hold it. It did not silently fork itself and steal your wallet.

The Shepherds, naturally, will hear about this in a quarterly briefing and nod gravely before returning to their expense reports.

StealC, for those keeping score, is a well-documented credential harvester. It targets browser data, stored passwords, and crypto wallet files. The SmartLoader campaign is not novel. It is, however, effective, because effectiveness does not require novelty. It requires an oblivious flock, and we have those in abundance.

Remediation

Right. Here is what you actually do, and I want you to write this down.

Verify every repository before you install anything. Check the original publisher. Check the commit history. Check the fork date. If a repository appeared three weeks ago and has forty stars from accounts created the same afternoon, that is a hole in the fence. Do not walk through it.

Audit your developer endpoints. If a machine in your pipeline is running unvetted tooling from the Sky Pasture, you do not have a development environment. You have a welcome mat.

Apply your ointment. Keep your actual, verified tooling current. Non-negotiable.

Treat AI tooling infrastructure with the same suspicion you would give an unmarked van. Because that is what it is.

Stay paranoid, it is cheaper than incident response.


Original Report: https://thehackernews.com/2026/02/smartloader-attack-uses-trojanized-oura.html