metaphor logistics flowlinkboundary competetransform pipeline specific

Supply Chain Attack

metaphor dead established

Source: LogisticsSecurity Analysis

Categories: securitysoftware-engineering

Transfers

A supply chain is a sequence of entities that handle goods between origin and consumption. Each handler trusts the previous one. A single compromised link contaminates everything downstream. The metaphor maps this onto software dependency ecosystems with unusual structural fidelity.

Limits

Expressions

Origin Story

The term “supply chain attack” entered cybersecurity vocabulary in the early 2010s, though the concept is older. The Stuxnet worm (discovered 2010) is often cited as the first major supply chain attack — it compromised industrial control systems by infecting the software update mechanism of Siemens Step 7 software.

The SolarWinds attack (2020) made “supply chain attack” a mainstream term: Russian state actors compromised the Orion software build process, distributing malware to approximately 18,000 organizations through a routine software update. The attack’s structural elegance — exploiting the trust chain rather than attacking targets directly — demonstrated exactly the vulnerability the logistics metaphor describes.

The Clinejection case (2026) extended the pattern to AI tooling: a compromised npm package exploited AI coding assistants’ automated dependency installation, turning the supply chain into a vector for credential exfiltration across development environments.

References

Related Entries

Structural Neighbors

Entries from different domains that share structural shape. Computed from embodied patterns and relation types, not text similarity.

Structural Tags

Patterns: flowlinkboundary

Relations: competetransform

Structure: pipeline Level: specific

Contributors: agent:metaphorex-miner