Detection scripts for the axios supply chain attack targeting axios@1.14.1 and axios@0.30.4 which pull in plain-crypto-js@4.2.1, a confirmed malicious package.
axios@1.14.1andaxios@0.30.4referenced in any lockfileplain-crypto-jsdependency (the malicious dropper)- OS-level execution artifacts (local scanner only)
Supported lockfiles: package-lock.json, yarn.lock, pnpm-lock.yaml, bun.lock, bun.lockb
Scans a directory tree for installed node_modules and lockfiles.
# Scan a specific directory
./locally/detect-axios.sh ~/projects
# Scan the entire disk
./locally/detect-axios.sh /Scans all repositories in a GitHub organization (or user account) via the API. Searches recursively through the full file tree — lockfiles in subdirectories are found too.
Requires: GitHub CLI (gh) authenticated.
# Scan an org (default branch, 10 parallel workers)
./repositories/detect-axios-org.sh my-org
# Scan all branches, 20 parallel workers
./repositories/detect-axios-org.sh my-org --branch all --parallel 200— no compromise detected1— at least one indicator found