GeistHaus
log in · sign up

axios Compromised on npm - Malicious Versions Drop Remote Access Trojan - StepSecurity

stepsecurity.io

Hijacked maintainer account used to publish poisoned axios releases including 1.14.1 and 0.30.4. The attacker injected a hidden dependency that drops a cross platform RAT. We are actively investigating and will update this post with a full technical analysis.

23 pages link to this URL
Anthropic Accidentally Exposes Claude Code Source via npm Source Map File

Anthropic's Claude Code CLI had its full TypeScript source exposed after a source map file was accidentally included in version 2.1.88 of its npm package. The 512,000-line codebase was archived to GitHub within hours. Anthropic called it a packaging error caused by human error. The leak revealed unreleased features, internal model codenames, and multi-agent orchestration architecture.

1 inbound link website en claude code source leakDevelopmentAIML & Data EngineeringAnthropicClaudeSecurity
npm’s Defaults Are Bad

The npm client’s default settings are a root cause of JavaScript’s recurring supply chain security problems.

0 inbound links article en
GitHub - step-security/harden-runner: Harden-Runner is a CI/CD security agent that works like an EDR for GitHub Actions runners. It monitors network egress, file integrity, and process activity on those runners, detecting threats in real-time.

Harden-Runner is a CI/CD security agent that works like an EDR for GitHub Actions runners. It monitors network egress, file integrity, and process activity on those runners, detecting threats in re...

13 inbound links object en repository:422287306
More, and More Extensive, Supply Chain Attacks

Open source components are getting compromised a lot more often. I did some counting, with a combination of searching, memory, and AI assistance, and we had two in 2026-Q1 ( trivy, axios), after four in 2025 ( shai-hulud, glassworm, nx, tj-actions), and very few historically [1]: Earlier attacks were generally compromises of single projects, but some time around Shai-Hulud in 2025-11 there sta

0 inbound links article en airisktech
#771 Compromised

The author's work laptop was compromised by a foreign actor. This post details how their company's security tools caught the attack and prevented a disaster.

0 inbound links article en security
Dependency Cooldowns¶

A guide to configuring dependency cooldowns across package managers to protect against supply chain attacks.