No impact to Voiceflow customers in supply-chain security incident (sha1-hulud)

Date: 24 November 2025

Status: Monitoring Resolution

Impact to Customer Data: None

Unauthorized Access: None detected

Summary

On 24 November 2025, Voiceflow identified and contained a security incident related to the widespread malicious NPM package attack known as sha1-hulud. This attack targeted open-source supply chains by compromising certain package versions used globally by the developer community.

Based on the threat intelligence published at HelixGuard (sha1-hulud) and our internal investigation, we can confirm that the incident did not result in any access to customer environments, customer data, or Voiceflow production systems.

All malicious activity was isolated to local development environments and automation accounts that were immediately revoked and reset.

What happened

Between 11:00 AM and 12:00 PM (UTC), our monitoring systems detected abnormal and automated behaviour linked to a malicious dependency used in developer environments.

According to our internal audit logs:

  • Several repositories in developer environments created suspicious branches consistent with the sha1-hulud attack pattern.
  • Approximately 141 repositories in developer machines were created and pushed to github.com as public repos along with 5 using a service account with passwords from 2 of our developers and our service account.
  • The malicious package was traced to a recently-updated version of kill-port, which aligns with public reports of the attack campaign.
  • New NPM packages with the affected package was published.

How we detected it

Our internal alerting systems (AWS Guarduty) flagged unusual, automated repository activity consistent with code injection patterns.

The incident was detected within minutes, and our engineering & security teams immediately initiated incident response procedures.

Based on audit logs reviewed across AWS, GitHub, NPM, CircleCI, and Doppler, we confirmed the following that no customer information was leaked and no access to our environment was done.

Immediate actions taken

Within minutes of detection, we executed a full containment and remediation procedure, including:

1. Credential revocation & rotation

We immediately revoked and recreated all access tokens associated with affected development accounts:

  • GitHub: service accounts and impacted developer tokens
  • AWS: all associated IAM access keys
  • NPM: all tokens belonging to affected users
  • Doppler: dev service accounts tokens were revoked

2. Automated removal of malicious branches

All suspicious branches were automatically deleted across affected repositories.

3. CI/CD cleanup

  • All CI caching layers were cleared.
  • CI/CD secrets were re-generated.
  • Pipelines were fully re-validated.

4. Package hardening

All affected services were updated to pin the dependency version and ensure malicious versions cannot be reintroduced.

5. Device remediation

Developer machines identified as affected were fully wiped and restored from clean baselines.

5. Re-publish packages

All packages were re-published without the affected package.

Impact assessment

After reviewing all audit logs, traffic logs, package registries, and access patterns, we can confirm:

  • No customer data was accessed or exposed.
  • No customer environments, projects, or assistants were accessed.
  • No infrastructure access occurred.
  • The attack was contained to local development environments and open-source repository metadata, consistent with the public behavior of the sha1-hulud worm.
  • Versions of our packages were published for a short time containing the malicious packages, these were removed quickly.. Please check Annex to see the affected packages and versions

Ongoing and future mitigations

Voiceflow is implementing additional controls to prevent recurrence:

  • Mandatory dependency pinning for all internal services.
  • Expanded supply-chain scanning in CI across NPM ecosystems.
  • Automatic blocklisting of known malicious NPM versions.
  • Hardening of developer machine baselines and continuous package integrity checking.
  • Strengthened behavior-based intrusion detection in GitHub and CI systems.

Customer Impact

There is no impact to Voiceflow customers, agents, data, or environments.

All systems remain fully operational, and no customer action is required. If customers would like to update their dependencies, use the latest version of our NPM packages published on November 25th, 2025.

We are sharing this advisory transparently to keep you informed and to demonstrate our commitment to rigorous supply-chain security.

What happened

Between 11:00 AM and 12:00 PM (UTC), our monitoring systems detected abnormal and automated behaviour linked to a malicious dependency used in developer environments.

According to our internal audit logs:

  • Several repositories in developer environments created suspicious branches consistent with the sha1-hulud attack pattern.
  • Approximately 141 repositories in developer machines were created and pushed to github.com as public repos along with 5 using a service account with passwords from 2 of our developers and our service account.
  • The malicious package was traced to a recently-updated version of kill-port, which aligns with public reports of the attack campaign.
  • New NPM packages with the affected package was published.

How we detected it

Our internal alerting systems (AWS Guarduty) flagged unusual, automated repository activity consistent with code injection patterns.

The incident was detected within minutes, and our engineering & security teams immediately initiated incident response procedures.

Based on audit logs reviewed across AWS, GitHub, NPM, CircleCI, and Doppler, we confirmed the following that no customer information was leaked and no access to our environment was done.

Immediate actions taken

Within minutes of detection, we executed a full containment and remediation procedure, including:

1. Credential revocation & rotation

We immediately revoked and recreated all access tokens associated with affected development accounts:

  • GitHub: service accounts and impacted developer tokens
  • AWS: all associated IAM access keys
  • NPM: all tokens belonging to affected users
  • Doppler: dev service accounts tokens were revoked

2. Automated removal of malicious branches

All suspicious branches were automatically deleted across affected repositories.

3. CI/CD cleanup

  • All CI caching layers were cleared.
  • CI/CD secrets were re-generated.
  • Pipelines were fully re-validated.

4. Package hardening

All affected services were updated to pin the dependency version and ensure malicious versions cannot be reintroduced.

5. Device remediation

Developer machines identified as affected were fully wiped and restored from clean baselines.

5. Re-publish packages

All packages were re-published without the affected package.

Impact assessment

After reviewing all audit logs, traffic logs, package registries, and access patterns, we can confirm:

  • No customer data was accessed or exposed.
  • No customer environments, projects, or assistants were accessed.
  • No infrastructure access occurred.
  • The attack was contained to local development environments and open-source repository metadata, consistent with the public behavior of the sha1-hulud worm.
  • Versions of our packages were published for a short time containing the malicious packages, these were removed quickly.. Please check Annex to see the affected packages and versions

Ongoing and future mitigations

Voiceflow is implementing additional controls to prevent recurrence:

  • Mandatory dependency pinning for all internal services.
  • Expanded supply-chain scanning in CI across NPM ecosystems.
  • Automatic blocklisting of known malicious NPM versions.
  • Hardening of developer machine baselines and continuous package integrity checking.
  • Strengthened behavior-based intrusion detection in GitHub and CI systems.

Customer Impact

There is no impact to Voiceflow customers, agents, data, or environments.

All systems remain fully operational, and no customer action is required. If customers would like to update their dependencies, use the latest version of our NPM packages published on November 25th, 2025.

We are sharing this advisory transparently to keep you informed and to demonstrate our commitment to rigorous supply-chain security.

RECOMMENDED
square-image

RECOMMENDED RESOURCES
No items found.