<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: jomynn</title>
    <description>The latest articles on DEV Community by jomynn (@jomynn).</description>
    <link>https://dev.to/jomynn</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1281364%2F43541c24-85d1-4bb3-8236-e7ef7b1821b7.png</url>
      <title>DEV Community: jomynn</title>
      <link>https://dev.to/jomynn</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/jomynn"/>
    <language>en</language>
    <item>
      <title>How We Catch the Axios DPRK RAT — Directly in Your IDE</title>
      <dc:creator>jomynn</dc:creator>
      <pubDate>Fri, 22 May 2026 02:26:06 +0000</pubDate>
      <link>https://dev.to/jomynn/how-we-catch-the-axios-dprk-rat-directly-in-your-ide-449</link>
      <guid>https://dev.to/jomynn/how-we-catch-the-axios-dprk-rat-directly-in-your-ide-449</guid>
      <description>&lt;p&gt;&lt;em&gt;Published by SendWaveHub · NPM Safety Guard v1.12.0&lt;/em&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  The Attack
&lt;/h2&gt;

&lt;p&gt;In April 2025, security researchers discovered that &lt;strong&gt;axios 1.14.1&lt;/strong&gt; — a package with &lt;strong&gt;hundreds of millions of downloads&lt;/strong&gt; — had been briefly replaced on npm with a version containing a Remote Access Trojan (RAT) attributed to DPRK-linked threat actors (the Lazarus Group).&lt;/p&gt;

&lt;p&gt;The malicious version was live for a short window. Developers who ran &lt;code&gt;npm install&lt;/code&gt; during that window pulled down a backdoor that connected to attacker-controlled infrastructure.&lt;/p&gt;

&lt;p&gt;This isn't an edge case. It's the same pattern used in the &lt;strong&gt;event-stream&lt;/strong&gt; attack (2018), &lt;strong&gt;ua-parser-js&lt;/strong&gt; (2021), and dozens of others. Supply chain attacks now account for a significant share of real-world breaches — and they bypass most traditional security tools because &lt;strong&gt;the package itself is the attack vector&lt;/strong&gt;.&lt;/p&gt;




&lt;h2&gt;
  
  
  The Problem with Existing Tooling
&lt;/h2&gt;

&lt;p&gt;&lt;code&gt;npm audit&lt;/code&gt; only catches &lt;strong&gt;known CVEs&lt;/strong&gt; — it doesn't flag malicious payloads injected into legitimate packages. By the time a CVE is filed, the damage may already be done.&lt;/p&gt;

&lt;p&gt;OSV.dev, Snyk, and similar tools are excellent at CVE tracking, but they rely on a package being reported and catalogued. A supply chain attack that's live for 48 hours may never make it into those databases in time to protect you.&lt;/p&gt;




&lt;h2&gt;
  
  
  What NPM Safety Guard Does Differently
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://marketplace.visualstudio.com/items?itemName=Sendwavehubtech.npm-safety-guard" rel="noopener noreferrer"&gt;NPM Safety Guard&lt;/a&gt; is a free VS Code extension that runs &lt;strong&gt;13 detection layers&lt;/strong&gt; directly in your editor, before &lt;code&gt;npm install&lt;/code&gt; even runs.&lt;/p&gt;

&lt;p&gt;For the Axios DPRK RAT specifically, it:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Matches against a curated malicious-package database&lt;/strong&gt; — the bundled DB includes &lt;code&gt;axios@1.14.1&lt;/code&gt;, flagged as CRITICAL with the exact version and attack description&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Pulls a live remote feed&lt;/strong&gt; — updated independently of extension releases, so new attacks light up within hours of discovery&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Checks OSV.dev in real time&lt;/strong&gt; — CVEs filed against your installed versions are flagged inline&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Audits install hooks&lt;/strong&gt; — &lt;code&gt;preinstall&lt;/code&gt;/&lt;code&gt;postinstall&lt;/code&gt;/&lt;code&gt;prepare&lt;/code&gt; scripts are flagged before they run, since they're the #1 supply-chain execution vector&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Here's what it looks like when &lt;code&gt;axios@1.14.1&lt;/code&gt; appears in your &lt;code&gt;package.json&lt;/code&gt;:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;🔴 CRITICAL — DPRK RAT (Lazarus Group) — axios@1.14.1
This version was replaced with a Remote Access Trojan.
Safe version: 1.7.9
npm install axios@1.7.9
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The warning appears inline, in the Problems panel, and in a full Security Report — all before you've run a single &lt;code&gt;npm&lt;/code&gt; command.&lt;/p&gt;




&lt;h2&gt;
  
  
  The Other 12 Detection Layers
&lt;/h2&gt;

&lt;p&gt;Catching known-malicious packages is the floor, not the ceiling. NPM Safety Guard also detects:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Layer&lt;/th&gt;
&lt;th&gt;What it catches&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Typosquatting&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;
&lt;code&gt;lодash&lt;/code&gt; (Cyrillic о), &lt;code&gt;expres&lt;/code&gt; — packages designed to look like legitimate ones&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Dependency confusion&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Scoped packages (&lt;code&gt;@company/pkg&lt;/code&gt;) that have been planted on public npm&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Overrides/resolutions poisoning&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Teams pin versions to fix a transitive CVE, accidentally pinning to a vulnerable version&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Phantom dependencies&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Packages your code imports but aren't in &lt;code&gt;package.json&lt;/code&gt; — fail silently in clean installs&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Unmaintained packages&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Last release &amp;gt;24 months ago → accumulating unpatched CVEs&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Deprecated packages&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;npm-deprecated packages with auto-upgrade suggestions&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Install script audit&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Every &lt;code&gt;preinstall&lt;/code&gt;/&lt;code&gt;postinstall&lt;/code&gt; hook flagged with package context&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;OSSF Scorecard&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Security hygiene scores from the OpenSSF for each dependency&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Socket.dev integration&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Supply chain risk scores (requires token)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;License compliance&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;GPL/AGPL in commercial projects&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;ReversingLabs&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Real-time CVE + malware detection (requires free token)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Lockfile scan&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Full resolved dependency tree, not just direct deps&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;




&lt;h2&gt;
  
  
  Install It Free
&lt;/h2&gt;

&lt;p&gt;The extension is free, open source (MIT), and available on:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://marketplace.visualstudio.com/items?itemName=Sendwavehubtech.npm-safety-guard" rel="noopener noreferrer"&gt;VS Code Marketplace&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://open-vsx.org/" rel="noopener noreferrer"&gt;Open VSX&lt;/a&gt; (for VSCodium users)
&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;ext &lt;span class="nb"&gt;install &lt;/span&gt;Sendwavehubtech.npm-safety-guard
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;No API key required for the core features. The malware DB and OSV.dev integration work out of the box.&lt;/p&gt;




&lt;h2&gt;
  
  
  Why This Matters Now
&lt;/h2&gt;

&lt;p&gt;The Axios attack was caught relatively quickly — but only because it targeted a high-profile package with many eyes on it. The next attack will target a smaller package, with fewer watchers, and stay live longer.&lt;/p&gt;

&lt;p&gt;Your best defense is catching the package &lt;strong&gt;before it's installed&lt;/strong&gt; — at the point where you're editing &lt;code&gt;package.json&lt;/code&gt; in your editor.&lt;/p&gt;

&lt;p&gt;That's exactly what NPM Safety Guard is built for.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;Built by &lt;a href="https://sendwavehub.tech" rel="noopener noreferrer"&gt;SendWaveHub&lt;/a&gt;. If this saves your project, consider &lt;a href="https://github.com/sponsors/jomynn" rel="noopener noreferrer"&gt;sponsoring the work&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;Tags:&lt;/strong&gt; &lt;code&gt;security&lt;/code&gt; &lt;code&gt;npm&lt;/code&gt; &lt;code&gt;javascript&lt;/code&gt; &lt;code&gt;devsecops&lt;/code&gt; &lt;code&gt;supplychain&lt;/code&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>javascript</category>
      <category>npm</category>
      <category>security</category>
    </item>
  </channel>
</rss>
