Npm Supply-Chain Compromise Via Malicious Dependency Injection
Sources: 1 • Confidence: High • Updated: 2026-04-13 03:56
Key takeaways
- Axios versions 1.14.1 and 0.30.4 introduced a new dependency named plain-crypto-js.
- The malicious Axios releases were published to npm without an accompanying GitHub release.
- Using npm trusted publishing would ensure only the Axios GitHub Actions workflows can publish releases to npm.
- The plain-crypto-js package was freshly published malware that stole credentials and installed a remote access trojan (RAT).
- Axios, an HTTP client npm package with roughly 101 million weekly downloads, was targeted in a supply chain attack.
Sections
Npm Supply-Chain Compromise Via Malicious Dependency Injection
- Axios versions 1.14.1 and 0.30.4 introduced a new dependency named plain-crypto-js.
- The plain-crypto-js package was freshly published malware that stole credentials and installed a remote access trojan (RAT).
- Axios, an HTTP client npm package with roughly 101 million weekly downloads, was targeted in a supply chain attack.
Release-Artifact Mismatch As A Detection Heuristic
- The malicious Axios releases were published to npm without an accompanying GitHub release.
- A similar pattern of npm publication without a matching GitHub release was observed in the LiteLLM incident the prior week.
Publishing-Identity Controls To Reduce Token-Based Compromise Risk
- Using npm trusted publishing would ensure only the Axios GitHub Actions workflows can publish releases to npm.
- The unauthorized npm publishing of the malicious Axios versions likely originated from a leaked long-lived npm token.
Unknowns
- What is the confirmed compromise vector for the malicious Axios publishes (e.g., audit-log-confirmed token theft vs another mechanism)?
- What was the real-world propagation and impact scope (how many downstream projects pulled the malicious versions, and in what environments did execution occur)?
- What indicators of compromise (IOCs) and command-and-control details are associated with the plain-crypto-js malware, and what endpoints should be examined first?
- What were the exact publication times, discovery time, and remediation actions (yanks, patches, advisory publication), and how long the malicious versions were available?
- Was trusted publishing actually adopted for Axios after the incident, and were manual token-based publishing paths disabled or restricted?