Malicious releases expose SSH keys, cloud credentials, and Kubernetes secrets in developer environments through a hidden WAV‑based payload.