Meet the Authors

Key Takeaways What you need to know
  1. Mini Shai-Hulud targeted SAP development workflows through compromised open-source npm packages tied to SAP CAP and Cloud MTA Build Tool.

  2. SAP developer tool security now requires oversight of package managers, repositories, credentials, CI/CD systems, and build pipelines.

  3. SAP software supply chain security depends on governing the tools and external components used to build, extend, and connect SAP applications.

Mini Shai-Hulud exposed a weak point many organizations do not treat as part of the SAP landscape. The developer toolchain sits close to the credentials, repositories, and build workflows used to create and connect SAP applications.

On April 29, 2026, SAP warned customers that malicious code was found in four open-source npm packages used in SAP development: @cap-js/sqlite, @cap-js/postgres, @cap-js/db-service, and mbt. The packages are tied to development workflows for SAP Business Technology Platform, the SAP Cloud Application Programming Model (SAP CAP), and the Cloud MTA Build Tool.

Layer Seven Security’s analysis frames the incident as a software supply chain warning for SAP customers. Mini Shai-Hulud showed how risk can move through development tools, package managers, build pipelines, and credentials before it reaches the SAP systems those tools support.

Explore related questions

What Was Affected in the SAP npm Package Compromise

The compromised packages were part of the npm ecosystem, a public registry that developers use to download reusable code. In SAP environments, npm is often part of Node.js-based development for cloud applications, extensions, services, and integrations.

That makes the incident relevant beyond the four package names. SAP teams use development tools such as SAP CAP and the Cloud MTA Build Tool to create services, package applications, and connect SAP systems with other platforms. Those workflows can involve source code, authentication tokens, service keys, and cloud credentials.

The affected packages were available for only a short period, but that does not eliminate the risk. A compromised package can create exposure as soon as it is installed on a developer workstation or build system. From there, malicious code may be able to reach the credentials and configuration files used across development and deployment workflows.

Mini Shai-Hulud shows why software supply chain risk cannot be treated as separate from SAP security. Development tools can expose credentials, repositories, and deployment workflows if they are not properly governed.

How Mini Shai-Hulud Targeted SAP Development Workflows

The attack targeted the trust developers place in common project tools. According to Layer Seven Security, the malicious packages could add hidden instructions to project folders so code would run automatically when opened in tools such as VS Code or Claude Code.

That made the developer environment part of the attack path. The malware downloaded Bun, a JavaScript runtime, and used it to run an obfuscated JavaScript file with the user’s permissions. From there, it could search the machine for credentials and other data.

The practical risk was credential theft and propagation. If a developer or build system had access to GitHub, npm, cloud platforms, or CI/CD tools, the malware could attempt to collect those credentials. In CI/CD environments, the attack also tried to interfere with publishing workflows so additional compromised packages could be released.

Development and deployment workflows often connect multiple systems. A compromised package may start in a local project folder, but the risk can spread to repositories, build jobs, package publishing, and cloud services.

What SAP Security Teams Should Check After Mini Shai-Hulud

Layer Seven Security advises SAP teams to first determine whether the affected package versions were installed on developer machines, build agents, or CI/CD systems.

That review should include local project folders, package caches, lockfiles, repositories, workflow files, and build environments used for SAP extensions or cloud services.

If there is any sign of exposure, teams should treat related credentials as unsafe. GitHub tokens, npm tokens, cloud keys, CI/CD credentials, and service account credentials should be reviewed and rotated where needed.

The response should not stop with cleanup. Layer Seven Security frames Mini Shai-Hulud as part of a wider SAP supply chain risk around trusted software and external components. Those risks can surround SAP systems even when core applications remain unchanged.

That is where SAP-focused monitoring and control become important. The Cybersecurity Extension for SAP from Layer Seven Security serves as a closed-source, SAP-certified security layer for vulnerability management, threat detection, custom code analysis, compliance auditing, incident response, and SIEM integration. SAP teams need to know which tools, packages, connections, and credentials touch their SAP environments.

Mini Shai-Hulud shows that the SAP attack surface now includes the software supply chain used to build, extend, and connect SAP applications. Securing that layer requires more than patching packages. It requires governance over developer tools, credentials, external components, and the systems that watch for suspicious change.

What This Means for SAPinsiders

  • SAP security ownership is becoming more distributed. Mini Shai-Hulud shows that development, security, Basis, and cloud teams now share parts of the same risk surface. Clear ownership matters because toolchain exposure can sit between traditional SAP administration and application development.
  • Credential governance needs operational context. Rotating tokens after an incident is necessary, but SAP teams also need to understand what each credential can reach. The next maturity step is mapping credentials to repositories, services, deployment paths, and business-critical SAP workflows.
  • Supply chain risk changes clean core planning. Clean core strategies depend on extensions, APIs, cloud services, and supported development patterns. Mini Shai-Hulud shows that those surrounding components need their own controls, because extensibility can reduce core modification risk while increasing dependency risk.