With the rise of AI, the amount of security advisories is ramping up. Every advisory pulls engineers into triage, package selection, validation, review, and audit notes. Bosun starts that task when the advisory lands, applies your policy, and produces a reviewable PR or a clear reason to wait.
The alert is the easy part. The real cost is pulling engineers out of product work to identify exposure, choose a safe target version, prove the fix, and explain the change under pressure. As npm security noise grows, slow response becomes a planning problem, not just a security problem.
Self-spreading npm malware, compromised package releases, install-time payloads, and trusted-publisher abuse all create the same operational work: stop what you were building, find exposure fast, choose the right fix, verify it, and leave a clear audit trail.
CVE patching is a process, not a moment. Bosun gives that process structure: detect exposure, triage advisories, choose a safe fix, prove the change, and document the decision. Already handling CVEs differently? Modify the task to match your policy, use it as a template to drive for different ecosystems, or roll your own.
Reviewers get the advisory, decision, patch, proof, and rollback path in one place. No one has to infer security intent from a package-lock diff.
CVE-2026-45321 involved malicious npm versions published through a trusted release path. This repo resolves through the affected package family.
@tanstack/router-core 1.169.5 -> fixed release
audit clean, tests pass, lockfile diff scoped
Bosun starts remediation when advisories land, applies your policy, and gives reviewers the advisory, patch, and proof in one place.