Concerned about TeamPCP? Confirm your exposure in 30 minutes
A Kodem Security engineer will work with you to determine whether your environment is impacted by the TeamPCP supply chain campaign in ~30 minutes.
You can check for packages. We can tell you if the payload ran.
In your 30-minute exposure assessment, you will:


How it Works
On the call:
1.
A security engineer provides access to a Kodem tenant.
2.
Connect your repository.
3.
Validate what actually executed in runtime.
What we validate:
Execution of TeamPCP-related code paths.
Credential exposure (tokens, env, CI secrets).
Persistence or follow-on activity.
Runtime reachability and exploitability.
TeamPCP is a supply chain campaign, not a single CVE. The attack impacts trusted components across the development lifecycle, including:
Static analysis alone can’t confirm exposure, you need to know what actually ran.
A Kodem Security engineer will work with you to determine whether your environment is impacted by the TeamPCP supply chain campaign in ~30 minutes.

When the Supply Chain Becomes the Attack Surface: Inside the TeamPCP Campaign
In March 2026, a widely trusted security tool was turned into an attack vector. Trivy, an open-source vulnerability scanner used across CI/CD pipelines, was compromised and used to exfiltrate sensitive credentials from build environments.