Skip to content

alepee/axios-detect

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

22 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

axios-detect

Detection scripts for the axios supply chain attack targeting axios@1.14.1 and axios@0.30.4 which pull in plain-crypto-js@4.2.1, a confirmed malicious package.

What it detects

  • axios@1.14.1 and axios@0.30.4 referenced in any lockfile
  • plain-crypto-js dependency (the malicious dropper)
  • OS-level execution artifacts (local scanner only)

Supported lockfiles: package-lock.json, yarn.lock, pnpm-lock.yaml, bun.lock, bun.lockb

Scripts

Local filesystem scan

Scans a directory tree for installed node_modules and lockfiles.

# Scan a specific directory
./locally/detect-axios.sh ~/projects

# Scan the entire disk
./locally/detect-axios.sh /

GitHub organization scan

Scans all repositories in a GitHub organization (or user account) via the API. Searches recursively through the full file tree — lockfiles in subdirectories are found too.

Requires: GitHub CLI (gh) authenticated.

# Scan an org (default branch, 10 parallel workers)
./repositories/detect-axios-org.sh my-org

# Scan all branches, 20 parallel workers
./repositories/detect-axios-org.sh my-org --branch all --parallel 20

Exit codes

  • 0 — no compromise detected
  • 1 — at least one indicator found

About

Detection scripts for the axios@1.14.1 supply chain attack (plain-crypto-js). Local filesystem scan and remote GitHub organization scan via API (recursive file tree search, private repo support, parallel execution)

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages