<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://community.appian.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>KB-2377 Information about the TeamPCP / CanisterWorm Supply Chain compromise</title><link>https://community.appian.com/support/w/kb/3792/kb-2377-information-about-the-teampcp-canisterworm-supply-chain-compromise</link><description /><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><item><title>KB-2377 Information about the TeamPCP / CanisterWorm Supply Chain compromise</title><link>https://community.appian.com/support/w/kb/3792/kb-2377-information-about-the-teampcp-canisterworm-supply-chain-compromise</link><pubDate>Thu, 02 Apr 2026 17:24:45 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:2b641df6-4046-4163-8fdb-477ef1c73152</guid><dc:creator>Kaushal Patel</dc:creator><comments>https://community.appian.com/support/w/kb/3792/kb-2377-information-about-the-teampcp-canisterworm-supply-chain-compromise#comments</comments><description>Current Revision posted to Appian Knowledge Base by Kaushal Patel on 4/2/2026 5:24:45 PM&lt;br /&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;In late February and March 2026, a widespread supply chain campaign orchestrated by a threat actor known as TeamPCP (associated with the &amp;quot;CanisterWorm&amp;quot; malware) &lt;/span&gt;&lt;a href="https://www.endorlabs.com/learn/teampcp-isnt-done"&gt;&lt;span style="font-weight:400;"&gt;compromised&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; over 50 open-source libraries across multiple ecosystems, including PyPI, npm, Docker Hub, and GitHub Actions.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;While the campaign impacted dozens of libraries, notable targets included the litellm library on PyPI (versions 1.82.7 and 1.82.8) and Aqua Security&amp;#39;s vulnerability scanner, Trivy (&lt;/span&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33634"&gt;&lt;span style="font-weight:400;"&gt;CVE-2026-33634&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt;).&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Appian has investigated this broader campaign and affected services, and determined that it is not impacted. No vulnerable versions of the affected libraries associated with the TeamPCP/CanisterWorm compromise are present in the Appian Cloud environment or any of Appian&amp;rsquo;s products. We will continue to monitor the situation and provide any updates as appropriate.&lt;/span&gt;&lt;/p&gt;
&lt;h2 id="mcetoc_1jl7jgb3u1"&gt;&lt;span style="font-weight:400;"&gt;Additional Notes:&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following CVE was released with additional information on the scope of the vulnerability:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33634"&gt;&lt;span style="font-weight:400;"&gt;CVE-2026-33634&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; - (Aquasecurity Trivy Embedded Malicious Code Vulnerability)&lt;/span&gt;&lt;/p&gt;
&lt;h2 id="mcetoc_1jl7jgb3u1"&gt;&lt;span style="font-weight:400;"&gt;Supporting Documentation:&lt;/span&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.endorlabs.com/learn/teampcp-isnt-done"&gt;&lt;span style="font-weight:400;"&gt;https://www.endorlabs.com/learn/teampcp-isnt-done&lt;/span&gt;&lt;/a&gt;
&lt;ul&gt;&lt;/ul&gt;
&lt;a href="https://www.mend.io/blog/canisterworm-the-self-spreading-npm-attack-that-uses-a-decentralized-server-to-stay-alive/"&gt;&lt;span style="font-weight:400;"&gt;&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.mend.io/blog/canisterworm-the-self-spreading-npm-attack-that-uses-a-decentralized-server-to-stay-alive/"&gt;&lt;span style="font-weight:400;"&gt;https://www.mend.io/blog/canisterworm-the-self-spreading-npm-attack-that-uses-a-decentralized-server-to-stay-alive/&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="mcetoc_1jl7jgb3u2"&gt;&lt;span&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;This article applies to all supported versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Last reviewed:&amp;nbsp;&lt;/span&gt;&lt;span&gt;April 2, 2026&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: Security&lt;/div&gt;
</description></item><item><title>KB-2377 Information about the TeamPCP / CanisterWorm Supply Chain compromise</title><link>https://community.appian.com/support/w/kb/3792/kb-2377-information-about-the-teampcp-canisterworm-supply-chain-compromise/revision/2</link><pubDate>Thu, 02 Apr 2026 17:24:34 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:2b641df6-4046-4163-8fdb-477ef1c73152</guid><dc:creator>Kaushal Patel</dc:creator><comments>https://community.appian.com/support/w/kb/3792/kb-2377-information-about-the-teampcp-canisterworm-supply-chain-compromise#comments</comments><description>Revision 2 posted to Appian Knowledge Base by Kaushal Patel on 4/2/2026 5:24:34 PM&lt;br /&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;In late February and March 2026, a widespread supply chain campaign orchestrated by a threat actor known as TeamPCP (associated with the &amp;quot;CanisterWorm&amp;quot; malware) &lt;/span&gt;&lt;a href="https://www.endorlabs.com/learn/teampcp-isnt-done"&gt;&lt;span style="font-weight:400;"&gt;compromised&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; over 50 open-source libraries across multiple ecosystems, including PyPI, npm, Docker Hub, and GitHub Actions.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;While the campaign impacted dozens of libraries, notable targets included the litellm library on PyPI (versions 1.82.7 and 1.82.8) and Aqua Security&amp;#39;s vulnerability scanner, Trivy (&lt;/span&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33634"&gt;&lt;span style="font-weight:400;"&gt;CVE-2026-33634&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt;).&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Appian has investigated this broader campaign and affected services, and determined that it is not impacted. No vulnerable versions of the affected libraries associated with the TeamPCP/CanisterWorm compromise are present in the Appian Cloud environment or any of Appian&amp;rsquo;s products. We will continue to monitor the situation and provide any updates as appropriate.&lt;/span&gt;&lt;/p&gt;
&lt;h2 id="mcetoc_1jl7jgb3u1"&gt;&lt;span style="font-weight:400;"&gt;Additional Notes:&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following CVE was released with additional information on the scope of the vulnerability:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33634"&gt;&lt;span style="font-weight:400;"&gt;CVE-2026-33634&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; - (Aquasecurity Trivy Embedded Malicious Code Vulnerability)&lt;/span&gt;&lt;/p&gt;
&lt;h2 id="mcetoc_1jl7jgb3u1"&gt;&lt;span style="font-weight:400;"&gt;Supporting Documentation:&lt;/span&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.endorlabs.com/learn/teampcp-isnt-done"&gt;&lt;span style="font-weight:400;"&gt;https://www.endorlabs.com/learn/teampcp-isnt-done&lt;/span&gt;&lt;/a&gt;
&lt;ul&gt;&lt;/ul&gt;
&lt;a href="https://www.mend.io/blog/canisterworm-the-self-spreading-npm-attack-that-uses-a-decentralized-server-to-stay-alive/"&gt;&lt;span style="font-weight:400;"&gt;&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.mend.io/blog/canisterworm-the-self-spreading-npm-attack-that-uses-a-decentralized-server-to-stay-alive/"&gt;&lt;span style="font-weight:400;"&gt;https://www.mend.io/blog/canisterworm-the-self-spreading-npm-attack-that-uses-a-decentralized-server-to-stay-alive/&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="mcetoc_1jl7jgb3u2"&gt;&lt;span&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;This article applies to all supported versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Last reviewed:&amp;nbsp;&lt;/span&gt;&lt;span&gt;April 2, 2026&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;
</description></item><item><title>KB-XXXX Information about the TeamPCP / CanisterWorm Supply Chain compromise</title><link>https://community.appian.com/support/w/kb/3792/kb-2377-information-about-the-teampcp-canisterworm-supply-chain-compromise/revision/1</link><pubDate>Thu, 02 Apr 2026 17:24:18 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:2b641df6-4046-4163-8fdb-477ef1c73152</guid><dc:creator>Kaushal Patel</dc:creator><comments>https://community.appian.com/support/w/kb/3792/kb-2377-information-about-the-teampcp-canisterworm-supply-chain-compromise#comments</comments><description>Revision 1 posted to Appian Knowledge Base by Kaushal Patel on 4/2/2026 5:24:18 PM&lt;br /&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;In late February and March 2026, a widespread supply chain campaign orchestrated by a threat actor known as TeamPCP (associated with the &amp;quot;CanisterWorm&amp;quot; malware) &lt;/span&gt;&lt;a href="https://www.endorlabs.com/learn/teampcp-isnt-done"&gt;&lt;span style="font-weight:400;"&gt;compromised&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; over 50 open-source libraries across multiple ecosystems, including PyPI, npm, Docker Hub, and GitHub Actions.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;While the campaign impacted dozens of libraries, notable targets included the litellm library on PyPI (versions 1.82.7 and 1.82.8) and Aqua Security&amp;#39;s vulnerability scanner, Trivy (&lt;/span&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33634"&gt;&lt;span style="font-weight:400;"&gt;CVE-2026-33634&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt;).&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Appian has investigated this broader campaign and affected services, and determined that it is not impacted. No vulnerable versions of the affected libraries associated with the TeamPCP/CanisterWorm compromise are present in the Appian Cloud environment or any of Appian&amp;rsquo;s products. We will continue to monitor the situation and provide any updates as appropriate.&lt;/span&gt;&lt;/p&gt;
&lt;h2 id="mcetoc_1jl7jgb3u1"&gt;&lt;span style="font-weight:400;"&gt;Additional Notes:&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following CVE was released with additional information on the scope of the vulnerability:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33634"&gt;&lt;span style="font-weight:400;"&gt;CVE-2026-33634&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; - (Aquasecurity Trivy Embedded Malicious Code Vulnerability)&lt;/span&gt;&lt;/p&gt;
&lt;h2 id="mcetoc_1jl7jgb3u1"&gt;&lt;span style="font-weight:400;"&gt;Supporting Documentation:&lt;/span&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.endorlabs.com/learn/teampcp-isnt-done"&gt;&lt;span style="font-weight:400;"&gt;https://www.endorlabs.com/learn/teampcp-isnt-done&lt;/span&gt;&lt;/a&gt;
&lt;ul&gt;&lt;/ul&gt;
&lt;a href="https://www.mend.io/blog/canisterworm-the-self-spreading-npm-attack-that-uses-a-decentralized-server-to-stay-alive/"&gt;&lt;span style="font-weight:400;"&gt;&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.mend.io/blog/canisterworm-the-self-spreading-npm-attack-that-uses-a-decentralized-server-to-stay-alive/"&gt;&lt;span style="font-weight:400;"&gt;https://www.mend.io/blog/canisterworm-the-self-spreading-npm-attack-that-uses-a-decentralized-server-to-stay-alive/&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="mcetoc_1jl7jgb3u2"&gt;&lt;span&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;This article applies to all supported versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Last reviewed:&amp;nbsp;&lt;/span&gt;&lt;span&gt;April 2, 2026&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;
</description></item></channel></rss>