Fast-glob, a widely used Node.js utility designed to quickly find files and folders that match specific patterns, is maintained by a single developer working for Yandex, a Russian tech company that cooperates with requests from the Federal Security Service (FSB), Russia’s security and counterintelligence agency. The package has no known common vulnerabilities and exposures (CVEs); however, its status as a single-maintainer project—with no contributor oversight, poor security hygiene, and deep integration into thousands of software projects—makes it a high-risk dependency.
This package is at significant risk of falling under foreign ownership, control, and influence. We recommend its immediate removal from products, particularly those purchased or used by the U.S. Department of Defense or the Intelligence Community.
As the DoD cracks down on foreign influence in software, this serves as another powerful reminder that knowing who writes your code is just as critical as understanding what the code does.
Fast-glob is a software package used in Node.js environments to efficiently search for and match files using flexible pattern rules, a practice known as “globbing.” It supports synchronous, asynchronous, and streaming APIs, making it adaptable to the needs of various projects. The library supports inclusion and exclusion patterns, enabling precise file targeting. Fast-glob includes TypeScript type definitions out of the box, improving developer experience in typed environments. Its speed and feature set makes it a preferred alternative to older globbing libraries like node-glob.
Originally released in December 2016, fast-glob has been actively maintained and has gained widespread adoption within the JavaScript ecosystem. It is used in more than 5,000 public projects—including popular tools like Prettier—and currently receives more than 79 million downloads per week. Our investigation found it in more than 30 containers in approved DoD systems.

Fast-glob’s creator and sole maintainer goes by the GitHub user name mrmInc and lists their name as Denis Malinochkin in their GitHub profile. On Malinochkin’s public profile and website, they claim to be an engineer at Yandex—a Russian technology company—living in Odintsovo, Russia, a Western suburb of Moscow.
Via the mrmInc profile, Malinochkin is a significant contributor and/or maintainer to projects that directly and indirectly support fast-glob, including:
As a result of these contributions, mrmInc maintains a high degree of control over fast-glob’s functional dependencies, as well as commonly used alternatives.
A solo maintainer based in an authoritarian country—characterized by a strong security service and limited human rights protections—poses a potential risk to the security and integrity of the package, especially one with the access and popularity of fast-glob. Furthermore, given their association with Yandex—a Russian technology company best known for Yandex Search, the most popular search engine in Russia—the developer is also more likely to encounter the FSB or state security individuals in their day-to-day duties and could be susceptible to coercion.
While Yandex, which also has ride-sharing services, navigation products, and other consumer mobile applications, is not currently sanctioned by the United States or European Union, great care must be taken when using technology produced by those within the company due to its close cooperation and ties to the Russian state and security agencies. Notably, in 2019, the company voluntarily gave state-owned and Kremlin-aligned Sberbank a golden share, allowing veto power over transactions involving more than 25% of Yandex stock. Since then, Yandex has increasingly cooperated with Russian data-sharing laws, exposing users and companies to possible State surveillance, reduced privacy, malicious code, and data breaches. During the first half of 2024, according to its own transparency report and additional public reporting, the company complied with 80% of the 36,540 requests from the Russian government to share data about its users—a 12% increase during the same timeframe in 2023.
Following the COVID-19 pandemic and Russia’s invasion of Ukraine, Yandex has continuously collaborated closely with the Kremlin, according to a report from the MIT Technology Review:
This points to a pattern of state influence in Russian technology companies, which we previously detailed in a threat report on easyjson, a Go package owned, maintained, and controlled by Russian developers.
Put simply, fast-glob offers both the solo maintainer and the Kremlin an opportunity to carry out a state-sponsored attack, especially given the open-source community’s tendency to blindly adopt projects with little to no information about the contributors behind them. We cannot overstate the risks.
While mnmInc has no current ties to any threat actors, the profile could be compromised with near-zero effort. Once that happens, mnmInc could push or be influenced to make updates to more than 5,000 projects without oversight from any other GitHub user. This would allow Russia attack vectors immediate access to thousands of known projects—not to mention an unknown number of undisclosed and private projects, including the entire Node.js community. A compromise of that magnitude could infiltrate and disrupt critical infrastructure across government, commercial, healthcare, and financial systems, not to mention the countless other vital industries that citizens around the world rely on every day.
Fast-glob has several possible attack vectors that could currently be exploited:
And that’s just scratching the surface. Due to the extensive access fast-glob has to the file system, its threat size and opportunities to leverage many different types of attacks cannot be overstated.
At the time of writing, no CVEs have been filed against fast-glob.
There’s no quick and easy solution to replacing or fixing fast-glob. The best option is for mrmInc to add additional maintainers and oversight to the project, with new maintainers known to the open source community and living in democratic societies. This is the simplest solution that immediately protects the millions of projects that use fast-glob.
Absent that, you could replace fast-glob with a similar project suitable for your needs; pin to the current version; fork and maintain a version for your organization; or work with us to audit and replace components in your codebase that may be subject to foreign influence.
Open source software doesn’t need a CVE to be dangerous. It only needs access, obscurity, and complacency. Fast-glob is just another example of how foreign-controlled code can be embedded into the software we trust. As geopolitical tensions rise and cyber attacks become more sophisticated, surfacing these risks is a necessity.
For U.S.-based companies selling to the Department of Defense, the use of open-source projects like fast-glob or easyjson may prevent your software from passing the enhanced supply chain security measures that the Secretary of Defense outlined in a July 2025 DoD memo.
“The DoD will not procure any hardware or software susceptible to adversarial foreign influence that presents risk to mission accomplishment and must prevent such adversaries from introducing malicious capabilities into the products and services that are utilized by the Department.”
For any company handling sensitive data that may be of interest to foreign governments, it is imperative to identify who is writing the open-source code embedded in your software and assess whether they pose a threat to your customers and mission. The stakes are simply too high to overlook this critical aspect of software security.