Shai Hulud Detector
CLI scan of GitHub users or org members for published IOC-style signals
Shai Hulud Detector is a Typer-based CLI that uses the GitHub API (with a personal access token) to scan users or all members of an organization. The README documents heuristic checks: repository description patterns associated with the Shai Hulud npm-worm campaign and suspicious JSON files that may hold secrets or environment-style configuration. Output is color-coded (flag / okay / error) with verbose and worker concurrency options.
When it is useful
You are doing a quick triage after public reports, auditing many repos under an org, or teaching supply-chain response workflows. Positive flags are not proof; they require human follow-up and rotation of secrets.
What you can do
- Run
scanfor one or many usernames, orscan --orgfor membership-wide coverage. - Tune
--workersfor parallelism and use--verbosefor detail. - Follow the README’s recommended actions if something flags (rotate credentials, review installs, tighten CI).
Limits
- False positives and false negatives are possible; this is a helper, not a full malware lab or EDR replacement.
- API rate limits and token scope affect how fast and how deeply you can scan.
- Evolving attacks may add IOCs not yet reflected in the tool; pair with vendor intel and manual review.



