Cult I Mean Group
  • Communities
  • Create Post
  • Create Community
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
qaz@lemmy.world to Selfhosted@lemmy.worldEnglish · 16 hours ago

Axios JavaScript library has been compromised with malware in supply chain attack

github.com

external-link
message-square
10
fedilink
172
external-link

Axios JavaScript library has been compromised with malware in supply chain attack

github.com

qaz@lemmy.world to Selfhosted@lemmy.worldEnglish · 16 hours ago
message-square
10
fedilink
axios@1.14.1 and axios@0.30.4 are compromised · Issue #10604 · axios/axios
github.com
external-link
more details: https://www.stepsecurity.io/blog/axios-compromised-on-npm-malicious-versions-drop-remote-access-trojan Most likely, a maintainer's GitHub and npm accounts are compromised as these iss...
alert-triangle
You must log in or register to comment.
  • TechnoCat@piefed.social
    link
    fedilink
    English
    arrow-up
    11
    ·
    6 hours ago

    I always advocate switching to pnpm where install scripts are disabled by default. It has plenty of security features to ward off most supply chain attacks.

    • https://pnpm.io/settings#onlybuiltdependencies
    • https://pnpm.io/settings#minimumreleaseage
    • https://pnpm.io/blog/2025/12/29/pnpm-in-2025#security-by-default
    • techpeakedin1991@lemmy.ml
      link
      fedilink
      English
      arrow-up
      2
      ·
      5 hours ago

      Does disabling install scripts actually do anything though? The attack would still work if put in the code itself, no? The only difference I can see is that it would run when the project is run instead of when the package is installed.

      • TechnoCat@piefed.social
        link
        fedilink
        English
        arrow-up
        1
        ·
        5 minutes ago

        Minimum age would have prevented it in this case.

  • Eskuero@lemmy.fromshado.ws
    link
    fedilink
    English
    arrow-up
    26
    ·
    edit-2
    11 hours ago

    You can mitigate similar attacks by editing your .npmrc

    min-release-age=7 # days
    ignore-scripts=true
    
    • PetteriPano@lemmy.world
      link
      fedilink
      English
      arrow-up
      30
      arrow-down
      2
      ·
      11 hours ago

      It’s a good way to keep the exploit around for seven days, too, if you apply it right away.

      • Eskuero@lemmy.fromshado.ws
        link
        fedilink
        English
        arrow-up
        1
        ·
        42 minutes ago

        How? If you got hit by this you are looking at restoring the system from a safe previous version.

        And the compromised versions get pulled, not superseeded by a new release, so once you rebuild you would go back to a safe version…

      • taco_shale032@lemmy.ml
        link
        fedilink
        English
        arrow-up
        6
        ·
        11 hours ago

        I agree, I think it would be better to use something like dependabot or renovatebot so you can know of and apply security updates right away.

        • Eskuero@lemmy.fromshado.ws
          link
          fedilink
          English
          arrow-up
          9
          ·
          10 hours ago

          As long as the bot is not allowed to automatically merge minor version bumps in libraries…

          • magikmw@piefed.social
            link
            fedilink
            English
            arrow-up
            2
            ·
            6 hours ago

            Well yes, one can misuse any tool.

  • fizzle@quokk.au
    link
    fedilink
    English
    arrow-up
    7
    ·
    13 hours ago

    Doesn’t seem to have been live for very long.

Selfhosted@lemmy.world

selfhosted@lemmy.world

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: !selfhosted@lemmy.world

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.

Rules:

  1. Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it’s not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

  7. No low-effort posts. This is subjective and will largely be determined by the community member reports.

Resources:

  • selfh.st Newsletter and index of selfhosted software and apps
  • awesome-selfhosted software
  • awesome-sysadmin resources
  • Self-Hosted Podcast from Jupiter Broadcasting

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 1.63K users / day
  • 3.31K users / week
  • 8.3K users / month
  • 16.4K users / 6 months
  • 1 local subscriber
  • 57K subscribers
  • 5.8K Posts
  • 131K Comments
  • Modlog
  • mods:
  • Ruud@lemmy.world
  • Loki@lemmy.world
  • CannaVet@lemmy.world
  • devve@lemmy.world
  • HybridSarcasm@lemmy.world
  • HybridSarcasm@lemmy.hybridsarcasm.xyz
  • BE: 0.19.8
  • Modlog
  • Instances
  • Docs
  • Code
  • join-lemmy.org