{"ok":true,"generated_at":"2026-05-14T18:15:05.589Z","total":68,"entries":[{"package":{"name":"@uipath/widget.sdk","ecosystem":"npm"},"advisory_id":"GHSA-27w6-4p99-7x6q","severity":"critical","summary":"Malware in @uipath/widget.sdk","published_at":"2026-05-12T04:38:50Z","url":"https://github.com/advisories/GHSA-27w6-4p99-7x6q","vulnerable_version_range":"= 1.2.3","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/vss","ecosystem":"npm"},"advisory_id":"GHSA-wm4w-2r2c-gq5f","severity":"critical","summary":"Malware in @uipath/vss","published_at":"2026-05-12T04:38:34Z","url":"https://github.com/advisories/GHSA-wm4w-2r2c-gq5f","vulnerable_version_range":"= 0.1.6","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/vertical-solutions-tool","ecosystem":"npm"},"advisory_id":"GHSA-6hg5-98mg-m25x","severity":"critical","summary":"Malware in @uipath/vertical-solutions-tool","published_at":"2026-05-12T04:38:14Z","url":"https://github.com/advisories/GHSA-6hg5-98mg-m25x","vulnerable_version_range":"= 1.0.1","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/uipath-python-bridge","ecosystem":"npm"},"advisory_id":"GHSA-vmj3-j2j8-j8vg","severity":"critical","summary":"Malware in @uipath/uipath-python-bridge","published_at":"2026-05-12T04:37:54Z","url":"https://github.com/advisories/GHSA-vmj3-j2j8-j8vg","vulnerable_version_range":"= 1.0.1","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/ui-widgets-multi-file-upload","ecosystem":"npm"},"advisory_id":"GHSA-mv6w-f7c2-7g9v","severity":"critical","summary":"Malware in @uipath/ui-widgets-multi-file-upload","published_at":"2026-05-12T04:36:54Z","url":"https://github.com/advisories/GHSA-mv6w-f7c2-7g9v","vulnerable_version_range":"= 1.0.1","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/traces-tool","ecosystem":"npm"},"advisory_id":"GHSA-c7c5-8687-mmjw","severity":"critical","summary":"Malware in @uipath/traces-tool","published_at":"2026-05-12T04:36:39Z","url":"https://github.com/advisories/GHSA-c7c5-8687-mmjw","vulnerable_version_range":"= 1.0.1","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/tool-workflowcompiler","ecosystem":"npm"},"advisory_id":"GHSA-mp74-5gjx-v4mh","severity":"critical","summary":"Malware in @uipath/tool-workflowcompiler","published_at":"2026-05-12T04:36:19Z","url":"https://github.com/advisories/GHSA-mp74-5gjx-v4mh","vulnerable_version_range":"= 0.0.12","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/test-manager-tool","ecosystem":"npm"},"advisory_id":"GHSA-55p8-r93f-539h","severity":"critical","summary":"Malware in @uipath/test-manager-tool","published_at":"2026-05-12T04:35:59Z","url":"https://github.com/advisories/GHSA-55p8-r93f-539h","vulnerable_version_range":"= 1.0.2","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/telemetry","ecosystem":"npm"},"advisory_id":"GHSA-99pr-79hv-pf5c","severity":"critical","summary":"Malware in @uipath/telemetry","published_at":"2026-05-12T04:35:44Z","url":"https://github.com/advisories/GHSA-99pr-79hv-pf5c","vulnerable_version_range":"= 0.0.7","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/tasks-tool","ecosystem":"npm"},"advisory_id":"GHSA-qhq7-xgvv-c3xf","severity":"critical","summary":"Malware in @uipath/tasks-tool","published_at":"2026-05-12T04:35:24Z","url":"https://github.com/advisories/GHSA-qhq7-xgvv-c3xf","vulnerable_version_range":"= 1.0.1","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/solutionpackager-tool-core","ecosystem":"npm"},"advisory_id":"GHSA-39jx-hvgv-rrx7","severity":"critical","summary":"Malware in @uipath/solutionpackager-tool-core","published_at":"2026-05-12T04:35:04Z","url":"https://github.com/advisories/GHSA-39jx-hvgv-rrx7","vulnerable_version_range":"= 0.0.34","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/solutionpackager-sdk","ecosystem":"npm"},"advisory_id":"GHSA-v6fp-2vv4-5v87","severity":"critical","summary":"Malware in @uipath/solutionpackager-sdk","published_at":"2026-05-12T04:34:28Z","url":"https://github.com/advisories/GHSA-v6fp-2vv4-5v87","vulnerable_version_range":"= 1.0.11","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/solution-tool","ecosystem":"npm"},"advisory_id":"GHSA-7733-35c8-5p4f","severity":"critical","summary":"Malware in @uipath/solution-tool","published_at":"2026-05-12T04:34:09Z","url":"https://github.com/advisories/GHSA-7733-35c8-5p4f","vulnerable_version_range":"= 1.0.1","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/solution-packager","ecosystem":"npm"},"advisory_id":"GHSA-rqp5-9q9r-fp5h","severity":"critical","summary":"Malware in @uipath/solution-packager","published_at":"2026-05-12T04:33:48Z","url":"https://github.com/advisories/GHSA-rqp5-9q9r-fp5h","vulnerable_version_range":"= 0.0.35","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/rpa-tool","ecosystem":"npm"},"advisory_id":"GHSA-8jqg-95h3-6m8j","severity":"critical","summary":"Malware in @uipath/rpa-tool","published_at":"2026-05-12T04:33:13Z","url":"https://github.com/advisories/GHSA-8jqg-95h3-6m8j","vulnerable_version_range":"= 0.9.5","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/rpa-legacy-tool","ecosystem":"npm"},"advisory_id":"GHSA-g69j-r43j-r44p","severity":"critical","summary":"Malware in @uipath/rpa-legacy-tool","published_at":"2026-05-12T04:32:53Z","url":"https://github.com/advisories/GHSA-g69j-r43j-r44p","vulnerable_version_range":"= 1.0.1","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/robot","ecosystem":"npm"},"advisory_id":"GHSA-cx9h-9vrc-7393","severity":"critical","summary":"Malware in @uipath/robot","published_at":"2026-05-12T04:32:18Z","url":"https://github.com/advisories/GHSA-cx9h-9vrc-7393","vulnerable_version_range":"= 1.3.4","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/resources-tool","ecosystem":"npm"},"advisory_id":"GHSA-p33p-663f-fpxf","severity":"critical","summary":"Malware in @uipath/resources-tool","published_at":"2026-05-12T04:28:33Z","url":"https://github.com/advisories/GHSA-p33p-663f-fpxf","vulnerable_version_range":"= 0.1.11","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/resourcecatalog-tool","ecosystem":"npm"},"advisory_id":"GHSA-pgjp-cqh9-r24w","severity":"critical","summary":"Malware in @uipath/resourcecatalog-tool","published_at":"2026-05-12T04:28:12Z","url":"https://github.com/advisories/GHSA-pgjp-cqh9-r24w","vulnerable_version_range":"= 0.1.1","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/resource-tool","ecosystem":"npm"},"advisory_id":"GHSA-rjjc-4j74-hxff","severity":"critical","summary":"Malware in @uipath/resource-tool","published_at":"2026-05-12T04:27:37Z","url":"https://github.com/advisories/GHSA-rjjc-4j74-hxff","vulnerable_version_range":"= 1.0.1","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/project-packager","ecosystem":"npm"},"advisory_id":"GHSA-wgg7-jx79-9gm7","severity":"critical","summary":"Malware in @uipath/project-packager","published_at":"2026-05-12T04:27:16Z","url":"https://github.com/advisories/GHSA-wgg7-jx79-9gm7","vulnerable_version_range":"= 1.1.16","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/platform-tool","ecosystem":"npm"},"advisory_id":"GHSA-rw85-q9p7-6qc5","severity":"critical","summary":"Malware in @uipath/platform-tool","published_at":"2026-05-12T04:27:00Z","url":"https://github.com/advisories/GHSA-rw85-q9p7-6qc5","vulnerable_version_range":"= 1.0.1","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/packager-tool-workflowcompiler","ecosystem":"npm"},"advisory_id":"GHSA-jc43-rw5c-6gh3","severity":"critical","summary":"Malware in @uipath/packager-tool-workflowcompiler","published_at":"2026-05-12T04:26:39Z","url":"https://github.com/advisories/GHSA-jc43-rw5c-6gh3","vulnerable_version_range":"= 0.0.16","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/packager-tool-workflowcompiler-browser","ecosystem":"npm"},"advisory_id":"GHSA-887x-q7fp-r4jc","severity":"critical","summary":"Malware in @uipath/packager-tool-workflowcompiler-browser","published_at":"2026-05-12T04:26:03Z","url":"https://github.com/advisories/GHSA-887x-q7fp-r4jc","vulnerable_version_range":"= 0.0.34","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/packager-tool-webapp","ecosystem":"npm"},"advisory_id":"GHSA-gg48-r7c2-vgvx","severity":"critical","summary":"Malware in @uipath/packager-tool-webapp","published_at":"2026-05-12T04:25:22Z","url":"https://github.com/advisories/GHSA-gg48-r7c2-vgvx","vulnerable_version_range":"= 1.0.6","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/packager-tool-functions","ecosystem":"npm"},"advisory_id":"GHSA-p7v2-mh8g-c4xw","severity":"critical","summary":"Malware in @uipath/packager-tool-functions","published_at":"2026-05-12T04:24:42Z","url":"https://github.com/advisories/GHSA-p7v2-mh8g-c4xw","vulnerable_version_range":"= 0.1.1","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/packager-tool-flow","ecosystem":"npm"},"advisory_id":"GHSA-xj87-mq94-9mhc","severity":"critical","summary":"Malware in @uipath/packager-tool-flow","published_at":"2026-05-12T04:24:27Z","url":"https://github.com/advisories/GHSA-xj87-mq94-9mhc","vulnerable_version_range":"= 0.0.19","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/packager-tool-connector","ecosystem":"npm"},"advisory_id":"GHSA-g24w-7vm3-g9fq","severity":"critical","summary":"Malware in @uipath/packager-tool-connector","published_at":"2026-05-12T04:24:07Z","url":"https://github.com/advisories/GHSA-g24w-7vm3-g9fq","vulnerable_version_range":"= 0.0.19","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/packager-tool-case","ecosystem":"npm"},"advisory_id":"GHSA-5c2g-qxm6-3x6x","severity":"critical","summary":"Malware in @uipath/packager-tool-case","published_at":"2026-05-12T04:23:47Z","url":"https://github.com/advisories/GHSA-5c2g-qxm6-3x6x","vulnerable_version_range":"= 0.0.9","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/packager-tool-bpmn","ecosystem":"npm"},"advisory_id":"GHSA-3688-2wf8-g67g","severity":"critical","summary":"Malware in @uipath/packager-tool-bpmn","published_at":"2026-05-12T04:22:06Z","url":"https://github.com/advisories/GHSA-3688-2wf8-g67g","vulnerable_version_range":"= 0.0.9","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/packager-tool-apiworkflow","ecosystem":"npm"},"advisory_id":"GHSA-4rxh-6hgh-qm7w","severity":"critical","summary":"Malware in @uipath/packager-tool-apiworkflow","published_at":"2026-05-12T04:21:31Z","url":"https://github.com/advisories/GHSA-4rxh-6hgh-qm7w","vulnerable_version_range":"= 0.0.19","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/orchestrator-tool","ecosystem":"npm"},"advisory_id":"GHSA-pxj3-vc34-jc7w","severity":"critical","summary":"Malware in @uipath/orchestrator-tool","published_at":"2026-05-12T04:21:16Z","url":"https://github.com/advisories/GHSA-pxj3-vc34-jc7w","vulnerable_version_range":"= 1.0.1","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/maestro-tool","ecosystem":"npm"},"advisory_id":"GHSA-fr9p-h4v3-xx4c","severity":"critical","summary":"Malware in @uipath/maestro-tool","published_at":"2026-05-12T04:20:55Z","url":"https://github.com/advisories/GHSA-fr9p-h4v3-xx4c","vulnerable_version_range":"= 1.0.1","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/maestro-sdk","ecosystem":"npm"},"advisory_id":"GHSA-h6vp-2654-rw48","severity":"critical","summary":"Malware in @uipath/maestro-sdk","published_at":"2026-05-12T04:20:40Z","url":"https://github.com/advisories/GHSA-h6vp-2654-rw48","vulnerable_version_range":"= 1.0.1","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/llmgw-tool","ecosystem":"npm"},"advisory_id":"GHSA-qxg5-3xx4-vmc2","severity":"critical","summary":"Malware in @uipath/llmgw-tool","published_at":"2026-05-12T04:20:19Z","url":"https://github.com/advisories/GHSA-qxg5-3xx4-vmc2","vulnerable_version_range":"= 1.0.1","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/integrationservice-tool","ecosystem":"npm"},"advisory_id":"GHSA-865m-4j25-mvcf","severity":"critical","summary":"Malware in @uipath/integrationservice-tool","published_at":"2026-05-12T04:20:00Z","url":"https://github.com/advisories/GHSA-865m-4j25-mvcf","vulnerable_version_range":"= 1.0.2","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/insights-tool","ecosystem":"npm"},"advisory_id":"GHSA-4fcv-75gv-fmq6","severity":"critical","summary":"Malware in @uipath/insights-tool","published_at":"2026-05-12T04:19:23Z","url":"https://github.com/advisories/GHSA-4fcv-75gv-fmq6","vulnerable_version_range":"= 1.0.1","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/integrationservice-sdk","ecosystem":"npm"},"advisory_id":"GHSA-x399-mvwr-hhxf","severity":"critical","summary":"Malware in @uipath/integrationservice-sdk","published_at":"2026-05-12T04:19:23Z","url":"https://github.com/advisories/GHSA-x399-mvwr-hhxf","vulnerable_version_range":"= 1.0.2","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/insights-sdk","ecosystem":"npm"},"advisory_id":"GHSA-qqjm-wxv4-2754","severity":"critical","summary":"Malware in @uipath/insights-sdk","published_at":"2026-05-12T04:18:26Z","url":"https://github.com/advisories/GHSA-qqjm-wxv4-2754","vulnerable_version_range":"= 1.0.1","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"nextmove-mcp","ecosystem":"npm"},"advisory_id":"GHSA-fhg4-3pg2-pvgx","severity":"critical","summary":"Malware in nextmove-mcp","published_at":"2026-05-12T03:40:23Z","url":"https://github.com/advisories/GHSA-fhg4-3pg2-pvgx","vulnerable_version_range":"= 0.1.3","ai_relevance":{"matched_keywords":["-mcp"]},"primary_source":"GHSA"},{"package":{"name":"cmux-agent-mcp","ecosystem":"npm"},"advisory_id":"GHSA-gx6p-62rj-cg4m","severity":"critical","summary":"Malware in cmux-agent-mcp","published_at":"2026-05-12T03:37:28Z","url":"https://github.com/advisories/GHSA-gx6p-62rj-cg4m","vulnerable_version_range":"= 0.1.3","ai_relevance":{"matched_keywords":["-mcp","agent-"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/identity-tool","ecosystem":"npm"},"advisory_id":"GHSA-pj78-w622-mj3q","severity":"critical","summary":"Malware in @uipath/identity-tool","published_at":"2026-05-12T03:35:50Z","url":"https://github.com/advisories/GHSA-pj78-w622-mj3q","vulnerable_version_range":"= 0.1.1","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/gov-tool","ecosystem":"npm"},"advisory_id":"GHSA-54w3-rr2p-q43m","severity":"critical","summary":"Malware in @uipath/gov-tool","published_at":"2026-05-12T03:35:30Z","url":"https://github.com/advisories/GHSA-54w3-rr2p-q43m","vulnerable_version_range":"= 0.3.1","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/functions-tool","ecosystem":"npm"},"advisory_id":"GHSA-297w-c359-73wq","severity":"critical","summary":"Malware in @uipath/functions-tool","published_at":"2026-05-12T03:33:29Z","url":"https://github.com/advisories/GHSA-297w-c359-73wq","vulnerable_version_range":"= 1.0.1","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/flow-tool","ecosystem":"npm"},"advisory_id":"GHSA-vx3p-wg44-w4vr","severity":"critical","summary":"Malware in @uipath/flow-tool","published_at":"2026-05-12T03:33:09Z","url":"https://github.com/advisories/GHSA-vx3p-wg44-w4vr","vulnerable_version_range":"= 1.0.2","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/filesystem","ecosystem":"npm"},"advisory_id":"GHSA-pcc3-h294-wpgm","severity":"critical","summary":"Malware in @uipath/filesystem","published_at":"2026-05-12T03:32:33Z","url":"https://github.com/advisories/GHSA-pcc3-h294-wpgm","vulnerable_version_range":"= 1.0.1","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/docsai-tool","ecosystem":"npm"},"advisory_id":"GHSA-f4rv-vxjp-3cgh","severity":"critical","summary":"Malware in @uipath/docsai-tool","published_at":"2026-05-12T03:32:12Z","url":"https://github.com/advisories/GHSA-f4rv-vxjp-3cgh","vulnerable_version_range":"= 1.0.1","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/data-fabric-tool","ecosystem":"npm"},"advisory_id":"GHSA-5855-rwmr-f2qw","severity":"critical","summary":"Malware in @uipath/data-fabric-tool","published_at":"2026-05-12T03:31:40Z","url":"https://github.com/advisories/GHSA-5855-rwmr-f2qw","vulnerable_version_range":"= 1.0.2","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/context-grounding-tool","ecosystem":"npm"},"advisory_id":"GHSA-4c96-f3f6-hw7h","severity":"critical","summary":"Malware in @uipath/context-grounding-tool","published_at":"2026-05-12T03:31:21Z","url":"https://github.com/advisories/GHSA-4c96-f3f6-hw7h","vulnerable_version_range":"= 0.1.1","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/common","ecosystem":"npm"},"advisory_id":"GHSA-783q-c3wx-hqmr","severity":"critical","summary":"Malware in @uipath/common","published_at":"2026-05-12T03:30:01Z","url":"https://github.com/advisories/GHSA-783q-c3wx-hqmr","vulnerable_version_range":"= 1.0.1","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/codedapp-tool","ecosystem":"npm"},"advisory_id":"GHSA-q883-mhm4-f834","severity":"critical","summary":"Malware in @uipath/codedapp-tool","published_at":"2026-05-12T03:29:41Z","url":"https://github.com/advisories/GHSA-q883-mhm4-f834","vulnerable_version_range":"= 1.0.1","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/codedagents-tool","ecosystem":"npm"},"advisory_id":"GHSA-x32r-fm9q-m5q4","severity":"critical","summary":"Malware in @uipath/codedagents-tool","published_at":"2026-05-12T03:29:26Z","url":"https://github.com/advisories/GHSA-x32r-fm9q-m5q4","vulnerable_version_range":"= 0.1.12","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/codedagent-tool","ecosystem":"npm"},"advisory_id":"GHSA-vhx5-vm7v-x3qf","severity":"critical","summary":"Malware in @uipath/codedagent-tool","published_at":"2026-05-12T03:29:06Z","url":"https://github.com/advisories/GHSA-vhx5-vm7v-x3qf","vulnerable_version_range":"= 1.0.1","ai_relevance":{"matched_keywords":["agent-","@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/cli","ecosystem":"npm"},"advisory_id":"GHSA-r62p-98fh-6qv4","severity":"critical","summary":"Malware in @uipath/cli","published_at":"2026-05-12T03:28:10Z","url":"https://github.com/advisories/GHSA-r62p-98fh-6qv4","vulnerable_version_range":"= 1.0.1","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/case-tool","ecosystem":"npm"},"advisory_id":"GHSA-qw86-wh9r-mpgf","severity":"critical","summary":"Malware in @uipath/case-tool","published_at":"2026-05-12T03:27:50Z","url":"https://github.com/advisories/GHSA-qw86-wh9r-mpgf","vulnerable_version_range":"= 1.0.1","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/auth","ecosystem":"npm"},"advisory_id":"GHSA-pj44-6m9m-jxwh","severity":"critical","summary":"Malware in @uipath/auth","published_at":"2026-05-12T03:27:35Z","url":"https://github.com/advisories/GHSA-pj44-6m9m-jxwh","vulnerable_version_range":"= 1.0.1","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/apollo-wind","ecosystem":"npm"},"advisory_id":"GHSA-pg6f-gcgf-hrx9","severity":"critical","summary":"Malware in @uipath/apollo-wind","published_at":"2026-05-12T03:27:15Z","url":"https://github.com/advisories/GHSA-pg6f-gcgf-hrx9","vulnerable_version_range":"= 2.16.2","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/apollo-react","ecosystem":"npm"},"advisory_id":"GHSA-4r46-rx98-x3g7","severity":"critical","summary":"Malware in @uipath/apollo-react","published_at":"2026-05-12T03:26:55Z","url":"https://github.com/advisories/GHSA-4r46-rx98-x3g7","vulnerable_version_range":"= 4.24.5","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/apollo-core","ecosystem":"npm"},"advisory_id":"GHSA-j36c-8r88-423c","severity":"critical","summary":"Malware in @uipath/apollo-core","published_at":"2026-05-12T03:26:20Z","url":"https://github.com/advisories/GHSA-j36c-8r88-423c","vulnerable_version_range":"= 5.9.2","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/api-workflow-tool","ecosystem":"npm"},"advisory_id":"GHSA-rh47-m8gr-5v5q","severity":"critical","summary":"Malware in @uipath/api-workflow-tool","published_at":"2026-05-12T03:26:00Z","url":"https://github.com/advisories/GHSA-rh47-m8gr-5v5q","vulnerable_version_range":"= 1.0.1","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/ap-chat","ecosystem":"npm"},"advisory_id":"GHSA-96r2-76fx-7r8x","severity":"critical","summary":"Malware in @uipath/ap-chat","published_at":"2026-05-12T03:25:20Z","url":"https://github.com/advisories/GHSA-96r2-76fx-7r8x","vulnerable_version_range":"= 1.5.7","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/aops-policy-tool","ecosystem":"npm"},"advisory_id":"GHSA-qwfj-397c-fjm3","severity":"critical","summary":"Malware in @uipath/aops-policy-tool","published_at":"2026-05-12T02:59:32Z","url":"https://github.com/advisories/GHSA-qwfj-397c-fjm3","vulnerable_version_range":"= 0.3.1","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/agent.sdk","ecosystem":"npm"},"advisory_id":"GHSA-9hfm-w6gw-qc7c","severity":"critical","summary":"Malware in @uipath/agent.sdk","published_at":"2026-05-12T02:58:57Z","url":"https://github.com/advisories/GHSA-9hfm-w6gw-qc7c","vulnerable_version_range":"= 0.0.18","ai_relevance":{"matched_keywords":["agent.sdk","@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/agent-tool","ecosystem":"npm"},"advisory_id":"GHSA-m2qh-7jff-73g8","severity":"critical","summary":"Malware in @uipath/agent-tool","published_at":"2026-05-12T02:58:37Z","url":"https://github.com/advisories/GHSA-m2qh-7jff-73g8","vulnerable_version_range":"= 1.0.1","ai_relevance":{"matched_keywords":["agent-","@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/agent-sdk","ecosystem":"npm"},"advisory_id":"GHSA-g4jv-2xqr-ffr9","severity":"critical","summary":"Malware in @uipath/agent-sdk","published_at":"2026-05-12T02:58:17Z","url":"https://github.com/advisories/GHSA-g4jv-2xqr-ffr9","vulnerable_version_range":"= 1.0.2","ai_relevance":{"matched_keywords":["agent-sdk","agent-","@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/admin-tool","ecosystem":"npm"},"advisory_id":"GHSA-mfv5-8q6g-j242","severity":"critical","summary":"Malware in @uipath/admin-tool","published_at":"2026-05-12T02:57:22Z","url":"https://github.com/advisories/GHSA-mfv5-8q6g-j242","vulnerable_version_range":"= 0.1.1","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/access-policy-tool","ecosystem":"npm"},"advisory_id":"GHSA-8cx9-3j2f-qgqv","severity":"critical","summary":"Malware in @uipath/access-policy-tool","published_at":"2026-05-12T02:57:02Z","url":"https://github.com/advisories/GHSA-8cx9-3j2f-qgqv","vulnerable_version_range":"= 0.3.1","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"},{"package":{"name":"@uipath/access-policy-sdk","ecosystem":"npm"},"advisory_id":"GHSA-3x69-xfjm-x94w","severity":"critical","summary":"Malware in @uipath/access-policy-sdk","published_at":"2026-05-12T02:56:22Z","url":"https://github.com/advisories/GHSA-3x69-xfjm-x94w","vulnerable_version_range":"= 0.3.1","ai_relevance":{"matched_keywords":["@uipath/"]},"primary_source":"GHSA"}],"sources":[{"name":"GitHub Security Advisories","url":"https://api.github.com/advisories","license":"GitHub Terms of Service. Attribution required."},{"name":"TensorFeed.ai (filter and republish)","url":"https://tensorfeed.ai/api/security/ai-supply-chain-iocs.json","license":"TF filters and republishes advisories already public at their primary source. Cite the source row for primary authority."}],"posture":"TensorFeed re-publishes already-public AI/MCP/LLM-relevant supply-chain advisories. We do not detect malware, attribute it, or actively scan. Always treat the listed primary source as authoritative."}