Axios didn't just have a bug. It had a serious trust issue. Let's be real: when a package with over 100 million weekly downloads gets hacked, saying "we'll patch it later" isn't a plan. It's asking for trouble. The recent Axios mess was a huge red flag for the whole JavaScript world. Attackers took over the npm account, pushed out malicious versions, and turned this super-popular HTTP client into a way to spread malware. With 174,000+ projects using it, that's not some small glitch, it's a massive problem that hits everyone. This wasn't out of nowhere, either. Axios already had security warnings for stuff like SSRF and DoS attacks in various versions. Sure, fixes get released, but the real headache is what happens when you can't fully trust a key dependency anymore. Developers need an easier way to move on without tearing apart their code. That's why I created axios-fixed. It's a tougher, safer version on npm that fixes the vulnerabilities I targeted, and switching to it is dead simple, no big refactor needed. Here's how: Link : https://lnkd.in/dEyZDQjB Install it: npm install axios-fixed Swap the import: From: import axios from 'axios' To: import axios from 'axios-fixed' That's it. Minimal hassle, quick switch, and way better security. I built this because dev teams shouldn't pick between speed and safety. Open source powers the web, but trust is non-negotiable now. Time to level up our tools. #JavaScript #NodeJS #OpenSource #CyberSecurity #NPM #WebDevelopment #SupplyChainSecurity #Axios #Developers
Fixing Axios Security Issues with axios-fixed
More Relevant Posts
-
🚨 Security Alert : Axios npm package compromise If you're a JavaScript developer, this is something you should NOT ignore. Yesterday, a supply chain attack was discovered in the popular axios npm package. Malicious versions were published using a compromised maintainer account, and they can potentially install a Remote Access Trojan (RAT) on your system. ⚠️ Affected versions: • axios@1.14.1 • axios@0.30.4 These versions include a hidden malicious dependency, which means even a simple npm i axios could put your system at risk. 🛑 Action items: • Do NOT install or upgrade axios blindly • Stick to safe versions (e.g. 1.14.0 or earlier) • Audit your current projects for affected versions • If already installed, assume compromise: – Reinstall dependencies – Run a full system/security audit – Rotate all credentials (passwords, API keys, tokens) This is a reminder that even widely trusted packages are not immune to supply chain attacks. Stay cautious. Always verify before upgrading dependencies. 🔗 Sources: https://lnkd.in/gvwbsyqj https://lnkd.in/gYamcE5M #AxiosAttack #Security #JavaScript #NodeJS #OpenSource #CyberSecurity #Developers #Tech #React #ReactNative
To view or add a comment, sign in
-
-
JavaScript devs this one's serious. Please take 2 minutes to read this. Yesterday someone pulled off one of the scariest npm attacks I've seen in a while. axios the HTTP library literally every Node.js project uses got backdoored. The attacker didn't do anything flashy. They just quietly took over the npm account of axios's lead maintainer, changed the email, locked him out, and pushed two malicious versions (1.14.1 and 0.30.4). That's it. No dramatic code injection into axios itself they just slipped in a fake dependency called plain-crypto-js that ran a postinstall script and dropped a Remote Access Trojan on your machine. Mac, Windows, Linux all affected. It was live for about 3 hours. 3 hours on a package with 100M+ weekly downloads. North Korean state-sponsored hackers are being blamed for this one, which honestly explains the level of sophistication double obfuscated dropper, platform-specific payloads, anti-forensic cleanup. This wasn't some script kiddie. If your CI/CD pipeline or dev machine ran npm install anywhere between 00:21 and 03:29 UTC on March 31, you need to act now: Check your lock file first: grep -E '1.14.1|0.30.4' package-lock.json If you're affected, don't just update the package and move on. Assume full breach. Revoke everything API keys, SSH keys, GitHub tokens, cloud credentials. All of it. Check your outbound traffic for any connections to sfrclak[.]com The packages are gone from npm now, but if they ran on your system, the malware already did its job. What frustrates me most about this is how simple the actual attack was. The npm ecosystem trusts maintainer accounts completely and that's the vulnerability. Not the code. The trust. Lock down your machines. Talk to your team. And maybe finally look into tools that verify package integrity before install. Stay safe everyone #JavaScript #NodeJS #CyberSecurity #OpenSource #SupplyChainAttack #axios
To view or add a comment, sign in
-
-
🚨 Security Alert: Axios npm Supply Chain Compromise If you are a JavaScript/TypeScript developer, stop what you’re doing and check your local environment. On March 30, the popular axios package was briefly compromised. Malicious versions (1.14.1 and 0.30.4) were published to npm, staying live for about 3.5 hours. If you ran npm install or yarn during that window—especially on personal projects without strict script protections—your machine might be at risk. The Risk: The compromised versions installed a malicious package called plain-crypto-js designed to harvest sensitive data like .env files and credentials. How to Protect Yourself: * Check your cache and node_modules: Look for any traces of plain-crypto-js. * Audit your .npmrc: Ensure you have ignore-scripts=true enabled to prevent malicious post-install scripts from executing automatically. * Rotate Secrets: If you find a match, assume your local environment variables have been compromised and rotate your API keys immediately. #CyberSecurity #SoftwareEngineering #Javascript #NodeJS #AppSec #SupplyChainAttack Use Quick scan script
To view or add a comment, sign in
-
-
🚨 Axios Supply Chain Attack — A Wake-Up Call for Every JavaScript Developer A recent incident involving the widely used Axios npm package shows just how fragile our ecosystem has become. 👉 A trusted library 👉 Millions of weekly downloads 👉 Compromised in hours And that was enough. ⸻ 💣 What happened? Attackers gained access to the official Axios package and published malicious versions: ⚠️ Compromised versions: • axios@1.14.1 • axios@0.30.4 These versions included: • A hidden malicious dependency (plain-crypto-js) • Code executed during install (postinstall) • A cross-platform Remote Access Trojan (RAT) 🧠 How the attack worked 👉 Maintainer account was compromised 👉 Legit-looking versions were published 👉 Malicious dependency injected 👉 Install scripts executed the payload No obvious red flags. No suspicious imports. Just trusted code. ⸻ 🔐 Real risk Once executed, the RAT could: • Steal credentials (tokens, SSH keys, env variables) • Access local files • Potentially allow remote control of the machine CI/CD pipelines were also vulnerable. ⸻ 🛡️ What you should do right now 🚫 Avoid / remove: • axios@1.14.1 • axios@0.30.4 🔍 Check for: • plain-crypto-js in your dependency tree 🔁 Rotate secrets if there’s any risk #javascript #npm #security #cybersecurity #opensource #webdev #supplychain
To view or add a comment, sign in
-
-
Headline: 🚨 Critical Alert: The Axios Supply Chain Attack (March 31, 2026) If you are a JavaScript/TypeScript developer, stop what you are doing and check your package-lock.json. Yesterday, one of the most downloaded libraries in the world—Axios (100M+ weekly downloads)—was the victim of a major supply chain compromise. Attributed to the North Korean-nexus group UNC1069, this attack bypasses standard code reviews using a "phantom dependency" technique. 🔴 What happened? A lead maintainer’s npm account was compromised. The attackers published two malicious versions: - axios@1.14.1 (Latest) - axios@0.30.4 (Legacy) These versions look identical to the original code, but they include a new "phantom" dependency called plain-crypto-js. ⚙️ How it works: 1. Silent Execution: When you run npm install, the postinstall script in the malicious dependency automatically triggers. 2. Cross-Platform Malware: It drops a Remote Access Trojan (RAT) tailored for your OS (Windows, macOS, or Linux). 3. Anti-Forensics: The malware is designed to delete its own installation scripts and replace the package.json with a "clean" stub version immediately after infection to hide its tracks from developers. 🛡️ How to resolve and audit: 1. Search your Lockfile: Don't just look in package.json. Search your package-lock.json or yarn.lock for plain-crypto-js or the specific Axios versions above. 2. Check your tree: Run npm ls plain-crypto-js. If it shows up, your environment is likely compromised. 3. Rollback & Pin: Revert to axios@1.14.0 or axios@0.30.3. Avoid using ^ or latest tags for now. 4. Assume Breach: If you found the malicious package, rotate all environment secrets (.env keys, AWS tokens, etc.) and treat that machine as "hot." The npm team has removed the versions, but the window of exposure was roughly 3 hours—enough time to infect thousands of CI/CD pipelines. Stay safe and audit your dependencies today! #CyberSecurity #NodeJS #Javascript #WebDev #AppSec #SupplyChainAttack #Axios
To view or add a comment, sign in
-
-
🚨𝐀𝐱𝐢𝐨𝐬 𝐒𝐮𝐩𝐩𝐥𝐲-𝐂𝐡𝐚𝐢𝐧 𝐀𝐭𝐭𝐚𝐜𝐤 — 𝐂𝐡𝐞𝐜𝐤 𝐘𝐨𝐮𝐫 𝐕𝐞𝐫𝐬𝐢𝐨𝐧 𝐈𝐦𝐦𝐞𝐝𝐢𝐚𝐭𝐞𝐥𝐲 A recent security incident impacted Axios, one of the most widely used HTTP libraries in the JavaScript ecosystem. Malicious versions were briefly published to npm as part of a supply-chain attack. ⚠️𝐀𝐟𝐟𝐞𝐜𝐭𝐞𝐝 𝐀𝐱𝐢𝐨𝐬 𝐕𝐞𝐫𝐬𝐢𝐨𝐧𝐬: • 1.14.1 • 0.30.4 If you installed any of the above versions, your environment may be compromised. 🔍𝐇𝐨𝐰 𝐭𝐨 𝐜𝐡𝐞𝐜𝐤: 𝘯𝘱𝘮 𝘭𝘴 𝘢𝘹𝘪𝘰𝘴 🛡️ 𝐅𝐢𝐱 𝐢𝐦𝐦𝐞𝐝𝐢𝐚𝐭𝐞𝐥𝐲: 𝘯𝘱𝘮 𝘶𝘯𝘪𝘯𝘴𝘵𝘢𝘭𝘭 𝘢𝘹𝘪𝘰𝘴 𝘯𝘱𝘮 𝘪𝘯𝘴𝘵𝘢𝘭𝘭 𝘢𝘹𝘪𝘰𝘴@𝘭𝘢𝘵𝘦𝘴𝘵 𝐖𝐡𝐚𝐭 𝐈 𝐝𝐢𝐝: • Verified dependency using npm ls axios • Confirmed Axios not installed → Not affected • Ran audit to validate project security 💡 𝐃𝐞𝐯𝐞𝐥𝐨𝐩𝐞𝐫 𝐓𝐚𝐤𝐞𝐚𝐰𝐚𝐲𝐬: • Lock dependency versions • Avoid blind updates • Monitor npm security alerts • Always run 𝘯𝘱𝘮 𝘢𝘶𝘥𝘪𝘵 • Review transitive dependencies 📚 𝐒𝐨𝐮𝐫𝐜𝐞 / 𝐅𝐮𝐫𝐭𝐡𝐞𝐫 𝐑𝐞𝐚𝐝𝐢𝐧𝐠: https://lnkd.in/gP2SaY2z Supply-chain attacks are increasing — even trusted libraries can be targeted. Always verify before installing. 𝐒𝐭𝐚𝐲 𝐬𝐞𝐜𝐮𝐫𝐞, 𝐝𝐞𝐯𝐞𝐥𝐨𝐩𝐞𝐫𝐬. 🔐 #axios #javascript #nodejs #npm #cybersecurity #webdevelopment #opensource #developers #softwareengineering #infosec
To view or add a comment, sign in
-
-
🚨 I installed a package… and it opened a backdoor. Sounds like a movie scene, right? It just happened in real life. On March 30, Axios — a library millions of developers trust — was quietly compromised. No warning. No obvious signs. Just installing certain versions (v1.14.1 / v0.30.4) could: ⚠️ Execute malicious code ⚠️ Drop a Remote Access Trojan (RAT) ⚠️ Connect your system to a hidden C2 server And the scariest part? It cleans up after itself… like nothing ever happened. 💭 Let that sink in: You don’t need to write vulnerable code anymore — You just need to install the wrong package. 🛡️ What I’m doing after this: • Locking dependencies • Auditing packages regularly • Trusting… but verifying Because in 2026, your biggest threat might be inside your package.json. #CyberSecurity #SupplyChainAttack #Axios #NodeJS #Developers #InfoSec #JavaScript #OpenSource
To view or add a comment, sign in
-
-
The official Axios package was just compromised. If you are a Node.js, frontend, or backend developer and have run "npm install" within the last 24 hours, you need to audit your project right now. Usually, when we hear about "Axios attacks," it’s just someone typosquatting (like axois). But this time, it was a direct supply-chain attack on the official npm registry. A lead maintainer’s account was hijacked, and two malicious versions were published. Compromised Versions: 1.14.1 and 0.30.4 These versions include a hidden Remote Access Trojan (RAT) designed to steal sensitive data from your system, including .env files, SSH keys, and AWS/database credentials. Immediate Steps to Protect Your Backend: 1- Check your lockfile (package-lock.json or yarn.lock): Open it and search for those two version numbers: 1.14.1 or 0.30.4. 2- If you have them: Your environment is compromised. You must manually delete node_modules, revert your lockfile, and most importantly, ROTATE every single API key, secret, and credential on that machine. 3- Pin your version: In your package.json, remove the caret (^) or tilde (~) from your axios version. Set it to exactly "axios": "1.14.0". This prevents npm from "helpfully" updating you to the compromised 1.14.1 version. This is a massive security event for the JavaScript ecosystem. Spread the word and help protect our community's projects! #SoftwareEngineering #WebSecurity #BackendDeveloper #TechNews #OpenSource #NodeJS #CyberSecurity #WebDevelopment #Backend #Programming
To view or add a comment, sign in
-
-
**🔒 The Axios Supply Chain Attack — A Wake-Up Call for Every Developer** On March 31, 2026, Axios — with 83M+ weekly downloads — was compromised in a supply chain attack. Here's what happened: 1. An attacker stole the maintainer's npm access token 2. Published a clean-looking package called `plain-crypto-js` 3. Pushed two poisoned Axios versions (1.14.1 and 0.30.4) that added it as a dependency 4. npm's `postinstall` script silently installed a Remote Access Trojan (RAT) on macOS, Windows, and Linux The scary part? **Not a single line of Axios source code was changed.** Just one extra dependency in `package.json`. And after deploying the RAT, the malware cleaned up after itself — your `node_modules` looked completely normal. The RAT phoned home every 60 seconds and could run shell commands, list files, exfiltrate data, and load additional malware. Elastic Security Labs linked the macOS payload to a **North Korean threat actor** (UNC1069). **What you should do RIGHT NOW:** → Check if you're on axios 1.14.1 or 0.30.4 — downgrade immediately → Remove `plain-crypto-js` from node_modules → Check for RAT artifacts on your machine → If affected: rotate ALL secrets, tokens, and API keys **Lessons learned:** ✅ Pin your dependency versions — don't blindly auto-upgrade ✅ Use lockfiles and review changes to them ✅ Disable postinstall scripts (`npm install --ignore-scripts`) ✅ Use tools like Socket, Snyk, or npm audit ✅ Enable 2FA on your npm account Supply chain attacks don't target your code. They target your trust. Stay vigilant. 📖 For a detailed step-by-step breakdown, check out my full blog post: https://lnkd.in/gmpiGQUv #CyberSecurity #JavaScript #npm #SupplyChainAttack #Axios #InfoSec #DevSecOps #SoftwareSecurity
To view or add a comment, sign in
-
🚨 URGENT: Massive Supply Chain Attack on Axios 🚨 If you use JavaScript or Node.js, drop what you're doing. The wildly popular NPM package axios (100M+ weekly downloads) has just been compromised. Threat actors hijacked the lead maintainer's account and published two poisoned versions that silently deploy a cross-platform Remote Access Trojan (RAT) via a malicious dependency (plain-crypto-js). Affected versions: 🛑 1.14.1 🛑 0.30.4 Immediate Action Required: If your CI/CD pipeline or developers pulled these versions between March 30–31, you must assume breach. Isolate the affected machines, rebuild from known-clean images, and instantly rotate all exposed secrets, tokens, and API keys. Read the full threat intelligence report and remediation steps here: 🔗 https://lnkd.in/gw_7W_8G #CyberSecurity #AppSec #NodeJS #Infosec #DevSecOps #SupplyChainAttack
To view or add a comment, sign in
More from this author
Explore content categories
- Career
- Productivity
- Finance
- Soft Skills & Emotional Intelligence
- Project Management
- Education
- Technology
- Leadership
- Ecommerce
- User Experience
- Recruitment & HR
- Customer Experience
- Real Estate
- Marketing
- Sales
- Retail & Merchandising
- Science
- Supply Chain Management
- Future Of Work
- Consulting
- Writing
- Economics
- Artificial Intelligence
- Employee Experience
- Workplace Trends
- Fundraising
- Networking
- Corporate Social Responsibility
- Negotiation
- Communication
- Engineering
- Hospitality & Tourism
- Business Strategy
- Change Management
- Organizational Culture
- Design
- Innovation
- Event Planning
- Training & Development