<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Bitwarden Statement on Checkmarx Supply Chain Incident]]></title><description><![CDATA[<p dir="auto"><a href="https://community.bitwarden.com/t/bitwarden-statement-on-checkmarx-supply-chain-incident/96127" target="_blank" rel="noopener noreferrer nofollow ugc">https://community.bitwarden.com/t/bitwarden-statement-on-checkmarx-supply-chain-incident/96127</a></p>
<p dir="auto">The Bitwarden CLI was compromised.</p>
<p dir="auto">"The investigation found no evidence that end user vault data was accessed or at risk, or that production data or production systems were compromised. Once the issue was detected, compromised access was revoked, the malicious npm release was deprecated, and remediation steps were initiated immediately.</p>
<p dir="auto">The issue affected the npm distribution mechanism for the CLI during that limited window, not the integrity of the legitimate Bitwarden CLI codebase or stored vault data."</p>
]]></description><link>https://forum.cloudron.io/topic/15436/bitwarden-statement-on-checkmarx-supply-chain-incident</link><generator>RSS for Node</generator><lastBuildDate>Fri, 24 Apr 2026 03:10:42 GMT</lastBuildDate><atom:link href="https://forum.cloudron.io/topic/15436.rss" rel="self" type="application/rss+xml"/><pubDate>Thu, 23 Apr 2026 21:58:35 GMT</pubDate><ttl>60</ttl></channel></rss>