| Version | Supported |
|---|---|
| main | ✅ |
This repository has implemented protections against the Axios npm supply chain compromise (CVE related to malicious versions 1.14.1 and 0.30.4).
Current Protections:
- Axios pinned to safe version 1.13.6 via
package.jsonoverrides - Lifecycle scripts disabled via
.npmrcandbunfig.toml - Security audit integrated into CI/CD pipeline
- Dependabot configured to block axios updates temporarily
Review Date: May 2, 2026 (30 days from implementation)
- Manual Review Required: All dependency updates must be manually reviewed
- No Auto-Updates: Automated dependency bots are restricted for critical packages
- Security Audits: Run
bun auditbefore merging dependency changes - Lock File: Always commit lock file changes with dependency updates
DO NOT open a public GitHub issue for security vulnerabilities.
- Email security concerns to the repository maintainers
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if available)
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Resolution: Critical vulnerabilities addressed within 14 days
-
Immediate Actions:
- Stop all CI/CD pipelines
- Isolate affected systems
- Do NOT run
npm installorbun installuntil verified
-
Assessment:
- Check for malicious package versions in
node_modules - Review CI/CD logs for suspicious activity
- Scan for indicators of compromise (IOCs)
- Check network logs for C2 connections
- Check for malicious package versions in
-
Remediation:
- Rotate all secrets and credentials exposed to affected systems
- Remove and reinstall dependencies from clean state
- Update pinned versions to known-safe releases
- Review and update override configurations
-
Recovery:
- Verify all systems are clean before resuming operations
- Document incident and lessons learned
- Update security measures based on findings
Malicious Axios Versions:
- axios@1.14.1
- axios@0.30.4
Malicious Dependency:
- plain-crypto-js@4.2.1
C2 Infrastructure:
- Domain: sfrclak[.]com
- IP: 142.11.206[.]73
- Port: 8000
- URL: hxxp://sfrclak[.]com:8000/6202033
Malicious Files:
- Windows:
%TEMP%\6202033.vbs,%TEMP%\6202033.ps1,%PROGRAMDATA%\system.bat,C:\ProgramData\wt.exe - macOS:
/Library/Caches/com.apple.act.mond - Linux:
/tmp/ld.py
- Never use
^or~for critical dependencies - Use exact versions - Review package changes - Check what changed before updating
- Use
bun install --ignore-scripts- When possible, skip lifecycle scripts - Monitor dependencies - Subscribe to security advisories
- Rotate credentials regularly - Especially after dependency updates
- Pin all dependencies - Use exact versions in
package.json - Use lock files - Always commit
bun.lock - Run security audits - Integrate
bun auditin pipelines - Limit permissions - Use minimal required permissions for workflows
- Monitor logs - Review CI/CD logs for anomalies
- Microsoft Security Blog - Axios Supply Chain Attack
- npm Security Best Practices
- GitHub Security Advisories
- Implemented Axios supply chain attack protections
- Added lifecycle script blocking
- Integrated security audit into CI/CD
- Created incident response plan