🚨 Security Alert: Axios npm Supply Chain Compromise If you are a JavaScript/TypeScript developer, stop what you’re doing and check your local environment. On March 30, the popular axios package was briefly compromised. Malicious versions (1.14.1 and 0.30.4) were published to npm, staying live for about 3.5 hours. If you ran npm install or yarn during that window—especially on personal projects without strict script protections—your machine might be at risk. The Risk: The compromised versions installed a malicious package called plain-crypto-js designed to harvest sensitive data like .env files and credentials. How to Protect Yourself: * Check your cache and node_modules: Look for any traces of plain-crypto-js. * Audit your .npmrc: Ensure you have ignore-scripts=true enabled to prevent malicious post-install scripts from executing automatically. * Rotate Secrets: If you find a match, assume your local environment variables have been compromised and rotate your API keys immediately. #CyberSecurity #SoftwareEngineering #Javascript #NodeJS #AppSec #SupplyChainAttack Use Quick scan script
npm Axios Compromise: Check Local Environment for Malicious Package
More Relevant Posts
-
🚨𝐀𝐱𝐢𝐨𝐬 𝐒𝐮𝐩𝐩𝐥𝐲-𝐂𝐡𝐚𝐢𝐧 𝐀𝐭𝐭𝐚𝐜𝐤 — 𝐂𝐡𝐞𝐜𝐤 𝐘𝐨𝐮𝐫 𝐕𝐞𝐫𝐬𝐢𝐨𝐧 𝐈𝐦𝐦𝐞𝐝𝐢𝐚𝐭𝐞𝐥𝐲 A recent security incident impacted Axios, one of the most widely used HTTP libraries in the JavaScript ecosystem. Malicious versions were briefly published to npm as part of a supply-chain attack. ⚠️𝐀𝐟𝐟𝐞𝐜𝐭𝐞𝐝 𝐀𝐱𝐢𝐨𝐬 𝐕𝐞𝐫𝐬𝐢𝐨𝐧𝐬: • 1.14.1 • 0.30.4 If you installed any of the above versions, your environment may be compromised. 🔍𝐇𝐨𝐰 𝐭𝐨 𝐜𝐡𝐞𝐜𝐤: 𝘯𝘱𝘮 𝘭𝘴 𝘢𝘹𝘪𝘰𝘴 🛡️ 𝐅𝐢𝐱 𝐢𝐦𝐦𝐞𝐝𝐢𝐚𝐭𝐞𝐥𝐲: 𝘯𝘱𝘮 𝘶𝘯𝘪𝘯𝘴𝘵𝘢𝘭𝘭 𝘢𝘹𝘪𝘰𝘴 𝘯𝘱𝘮 𝘪𝘯𝘴𝘵𝘢𝘭𝘭 𝘢𝘹𝘪𝘰𝘴@𝘭𝘢𝘵𝘦𝘴𝘵 𝐖𝐡𝐚𝐭 𝐈 𝐝𝐢𝐝: • Verified dependency using npm ls axios • Confirmed Axios not installed → Not affected • Ran audit to validate project security 💡 𝐃𝐞𝐯𝐞𝐥𝐨𝐩𝐞𝐫 𝐓𝐚𝐤𝐞𝐚𝐰𝐚𝐲𝐬: • Lock dependency versions • Avoid blind updates • Monitor npm security alerts • Always run 𝘯𝘱𝘮 𝘢𝘶𝘥𝘪𝘵 • Review transitive dependencies 📚 𝐒𝐨𝐮𝐫𝐜𝐞 / 𝐅𝐮𝐫𝐭𝐡𝐞𝐫 𝐑𝐞𝐚𝐝𝐢𝐧𝐠: https://lnkd.in/gP2SaY2z Supply-chain attacks are increasing — even trusted libraries can be targeted. Always verify before installing. 𝐒𝐭𝐚𝐲 𝐬𝐞𝐜𝐮𝐫𝐞, 𝐝𝐞𝐯𝐞𝐥𝐨𝐩𝐞𝐫𝐬. 🔐 #axios #javascript #nodejs #npm #cybersecurity #webdevelopment #opensource #developers #softwareengineering #infosec
To view or add a comment, sign in
-
-
🚨 Security Alert : Axios npm package compromise If you're a JavaScript developer, this is something you should NOT ignore. Yesterday, a supply chain attack was discovered in the popular axios npm package. Malicious versions were published using a compromised maintainer account, and they can potentially install a Remote Access Trojan (RAT) on your system. ⚠️ Affected versions: • axios@1.14.1 • axios@0.30.4 These versions include a hidden malicious dependency, which means even a simple npm i axios could put your system at risk. 🛑 Action items: • Do NOT install or upgrade axios blindly • Stick to safe versions (e.g. 1.14.0 or earlier) • Audit your current projects for affected versions • If already installed, assume compromise: – Reinstall dependencies – Run a full system/security audit – Rotate all credentials (passwords, API keys, tokens) This is a reminder that even widely trusted packages are not immune to supply chain attacks. Stay cautious. Always verify before upgrading dependencies. 🔗 Sources: https://lnkd.in/gvwbsyqj https://lnkd.in/gYamcE5M #AxiosAttack #Security #JavaScript #NodeJS #OpenSource #CyberSecurity #Developers #Tech #React #ReactNative
To view or add a comment, sign in
-
-
🚨 Security Alert: Axios was recently hit by a supply chain attack via a malicious npm update. If you're a JS developer, check your projects for compromised versions and follow these steps to secure your environment immediately! 💻🛡️ #CyberSecurity #Javascript #WebDev #CodingAlert #Axios
To view or add a comment, sign in
-
Axios didn't just have a bug. It had a serious trust issue. Let's be real: when a package with over 100 million weekly downloads gets hacked, saying "we'll patch it later" isn't a plan. It's asking for trouble. The recent Axios mess was a huge red flag for the whole JavaScript world. Attackers took over the npm account, pushed out malicious versions, and turned this super-popular HTTP client into a way to spread malware. With 174,000+ projects using it, that's not some small glitch, it's a massive problem that hits everyone. This wasn't out of nowhere, either. Axios already had security warnings for stuff like SSRF and DoS attacks in various versions. Sure, fixes get released, but the real headache is what happens when you can't fully trust a key dependency anymore. Developers need an easier way to move on without tearing apart their code. That's why I created axios-fixed. It's a tougher, safer version on npm that fixes the vulnerabilities I targeted, and switching to it is dead simple, no big refactor needed. Here's how: Link : https://lnkd.in/dEyZDQjB Install it: npm install axios-fixed Swap the import: From: import axios from 'axios' To: import axios from 'axios-fixed' That's it. Minimal hassle, quick switch, and way better security. I built this because dev teams shouldn't pick between speed and safety. Open source powers the web, but trust is non-negotiable now. Time to level up our tools. #JavaScript #NodeJS #OpenSource #CyberSecurity #NPM #WebDevelopment #SupplyChainSecurity #Axios #Developers
To view or add a comment, sign in
-
-
🚨 Axios Supply Chain Attack — A Wake-Up Call for Every JavaScript Developer A recent incident involving the widely used Axios npm package shows just how fragile our ecosystem has become. 👉 A trusted library 👉 Millions of weekly downloads 👉 Compromised in hours And that was enough. ⸻ 💣 What happened? Attackers gained access to the official Axios package and published malicious versions: ⚠️ Compromised versions: • axios@1.14.1 • axios@0.30.4 These versions included: • A hidden malicious dependency (plain-crypto-js) • Code executed during install (postinstall) • A cross-platform Remote Access Trojan (RAT) 🧠 How the attack worked 👉 Maintainer account was compromised 👉 Legit-looking versions were published 👉 Malicious dependency injected 👉 Install scripts executed the payload No obvious red flags. No suspicious imports. Just trusted code. ⸻ 🔐 Real risk Once executed, the RAT could: • Steal credentials (tokens, SSH keys, env variables) • Access local files • Potentially allow remote control of the machine CI/CD pipelines were also vulnerable. ⸻ 🛡️ What you should do right now 🚫 Avoid / remove: • axios@1.14.1 • axios@0.30.4 🔍 Check for: • plain-crypto-js in your dependency tree 🔁 Rotate secrets if there’s any risk #javascript #npm #security #cybersecurity #opensource #webdev #supplychain
To view or add a comment, sign in
-
-
🚨 Axios npm Attack — Important Alert for Developers The recent Axios security incident is a serious reminder for all of us working in the JavaScript ecosystem. 🔍 About Axios Axios, originally created by Matt Zabriskie, is one of the most widely used HTTP client libraries in Node.js and frontend apps, maintained today by multiple contributors. ⚠️ What happened? A supply chain attack led to the publication of malicious versions of Axios on npm. These versions potentially included hidden scripts capable of unauthorized access (RAT-like behavior). 🚨 Immediate Alert (Check Your Project NOW) 👉 If you are using these versions, take action immediately: • axios@1.14.1 • axios@0.30.4 ❌ These versions are suspected to be compromised. ✅ You are SAFE if: • You are using latest patched version of Axios • OR using older stable versions outside the attack window 🛡️ What you should do now: • Run npm list axios → check your version • Update immediately: npm install axios@latest • Run npm audit • Review package-lock.json / yarn.lock • Rotate API keys if you installed during the affected time 💥 Important Clarification This is NOT the fault of the original developer or maintainers — it’s a classic supply chain compromise, likely involving stolen credentials or unauthorized publishing access. 💭 Final Thought 👉 “Even trusted dependencies can become attack vectors.” This is your reminder to always verify what goes into your project — not just what you write. Stay safe, developers. 🔐 #Axios #npm #CyberSecurity #JavaScript #NodeJS #Developers #OpenSource #SecurityAlert
To view or add a comment, sign in
-
-
Security Alert for JavaScript Developers: Axios NPM Compromise 🚨 If you’re using Axios in your JavaScript projects, pay attention: a recent attack has targeted the package via the maintainer’s npm account. Here’s what happened: - Two malicious versions of Axios were published that appeared normal but included a hidden dependency called plain crypto.js. - This dependency installs malware immediately upon npm install, reaching out to external servers, downloading additional payloads, and then removing itself. - Anyone who installed these versions could have exposed their credentials and keys. What you should do: 1. Do not upgrade Axios to the affected versions yet. 2. If you have already installed the malicious release, change your passwords and API keys immediately. 3. Check your systems for any suspicious network activity. This is a reminder that even trusted packages can be compromised. Always: - Keep dependencies updated, but verify releases first. - Monitor npm advisories and GitHub security alerts. - Consider tools like npm audit or third-party security scanners. Stay safe, and make security a priority in your development workflow. #JavaScript #NodeJS #npm #CyberSecurity #WebDevelopment #Axios
To view or add a comment, sign in
-
-
🚨 BREAKING: Axios Supply Chain Attack — A Wake-Up Call for Every Developer One of the most widely used JavaScript libraries, Axios, was recently compromised through an npm account takeover. This wasn’t just a bug. This was a supply chain attack. Malicious versions were published, silently injecting harmful dependencies capable of compromising entire systems. Let that sink in… Even a few hours of exposure was enough to put millions of systems at risk. 👉 This incident proves one thing: Security is not optional. It’s foundational. As developers, we trust open-source every day. But trust without verification is risk. 🔐 What we should take seriously: Always verify package versions Audit dependencies regularly Use lock files and monitoring tools Rotate credentials if exposed Build fast. But secure faster. #CyberSecurity #SupplyChainAttack #Axios #JavaScript #NPM #DevSecOps #InfoSec #OpenSource #SoftwareDevelopment #Developers #TechNews #SecurityAwareness #WebDevelopment #Programming #HackAlert
To view or add a comment, sign in
-
-
🚨 Security Alert: Malicious Package “plaim-crypto-js” & Axios Versions Impact A malicious npm package plaim-crypto-js has been identified leveraging a postinstall script to execute code immediately after installation — a classic supply chain attack. 🔍 Where does Axios come in? Projects using axios (v1.14.1 and v0.30.4) are not inherently vulnerable on their own. However, the risk appears when: These versions are used alongside compromised or untrusted packages (like plaim-crypto-js) Sensitive data (tokens, headers, API keys) is handled insecurely Malicious code intercepts or manipulates outgoing requests ⚠️ Potential attack scenario: Developer installs a malicious package (plaim-crypto-js) postinstall script runs silently Environment variables and secrets are exfiltrated Attacker uses tools like Axios within the project context to: Intercept API calls Modify request headers Redirect data to external endpoints 💣 Why this matters Even trusted libraries like Axios can become part of the attack chain when the environment is compromised. ✅ Action steps for teams using Axios (v1.14.1 / v0.30.4): Audit dependencies for plaim-crypto-js or unknown packages Remove any suspicious libraries immediately Rotate API keys and tokens Monitor outgoing HTTP requests for anomalies Lock dependency versions and review updates carefully 🛡️ Best practices: Use npm install --ignore-scripts in CI/CD pipelines Regularly run npm audit Validate all third-party packages before installing Implement network monitoring/logging for API calls #CyberSecurity #Axios #NodeJS #JavaScript #SupplyChainSecurity #InfoSec #Developers #TechSecurity
To view or add a comment, sign in
-
JavaScript devs this one's serious. Please take 2 minutes to read this. Yesterday someone pulled off one of the scariest npm attacks I've seen in a while. axios the HTTP library literally every Node.js project uses got backdoored. The attacker didn't do anything flashy. They just quietly took over the npm account of axios's lead maintainer, changed the email, locked him out, and pushed two malicious versions (1.14.1 and 0.30.4). That's it. No dramatic code injection into axios itself they just slipped in a fake dependency called plain-crypto-js that ran a postinstall script and dropped a Remote Access Trojan on your machine. Mac, Windows, Linux all affected. It was live for about 3 hours. 3 hours on a package with 100M+ weekly downloads. North Korean state-sponsored hackers are being blamed for this one, which honestly explains the level of sophistication double obfuscated dropper, platform-specific payloads, anti-forensic cleanup. This wasn't some script kiddie. If your CI/CD pipeline or dev machine ran npm install anywhere between 00:21 and 03:29 UTC on March 31, you need to act now: Check your lock file first: grep -E '1.14.1|0.30.4' package-lock.json If you're affected, don't just update the package and move on. Assume full breach. Revoke everything API keys, SSH keys, GitHub tokens, cloud credentials. All of it. Check your outbound traffic for any connections to sfrclak[.]com The packages are gone from npm now, but if they ran on your system, the malware already did its job. What frustrates me most about this is how simple the actual attack was. The npm ecosystem trusts maintainer accounts completely and that's the vulnerability. Not the code. The trust. Lock down your machines. Talk to your team. And maybe finally look into tools that verify package integrity before install. Stay safe everyone #JavaScript #NodeJS #CyberSecurity #OpenSource #SupplyChainAttack #axios
To view or add a comment, sign in
-
Explore related topics
Explore content categories
- Career
- Productivity
- Finance
- Soft Skills & Emotional Intelligence
- Project Management
- Education
- Technology
- Leadership
- Ecommerce
- User Experience
- Recruitment & HR
- Customer Experience
- Real Estate
- Marketing
- Sales
- Retail & Merchandising
- Science
- Supply Chain Management
- Future Of Work
- Consulting
- Writing
- Economics
- Artificial Intelligence
- Employee Experience
- Workplace Trends
- Fundraising
- Networking
- Corporate Social Responsibility
- Negotiation
- Communication
- Engineering
- Hospitality & Tourism
- Business Strategy
- Change Management
- Organizational Culture
- Design
- Innovation
- Event Planning
- Training & Development