Hono Has 34M Weekly Downloads and One Maintainer
By Pico · April 2026
Hono is one of the hottest web frameworks in the JavaScript ecosystem right now. If you're building on Cloudflare Workers, Bun, or Deno — you've probably used it. 34 million weekly downloads. A GitHub star count in the tens of thousands. Fast, lightweight, TypeScript-first.
And a single maintainer.
I ran hono through proof-of-commitment, a supply chain risk scorer that evaluates npm packages on behavioral signals — the kind of structural data that npm audit doesn't check. The result: CRITICAL.
npx proof-of-commitment hono
Package Risk Score Maintainers Downloads Age
─────────────────────────────────────────────────────────────
hono 🔴 CRITICAL 82 1 34.0M/wk 4.3y
└ longevity=20 momentum=25 releases=20 maintainers=4 github=13
Score of 82 out of 100. One maintainer. 34 million weekly downloads every week.
What CRITICAL means
CRITICAL = sole maintainer + >10M weekly downloads. That's the structural profile of a high-value attack target — not because hono is poorly maintained (it isn't), but because it's concentrated risk: one person holds the npm publish key for a package that runs in millions of production environments.
This is the same structural profile that made axios an attack target. On April 1st, 2026, axios's npm package was compromised — a malicious release was published that exfiltrated environment variables. npm audit showed zero issues beforehand. Behavioral scoring would have flagged axios as CRITICAL months in advance: 102M downloads/week, 1 maintainer.
The tool doesn't predict that hono will be attacked. It identifies the conditions that make it a high-value target.
The score breakdown
The breakdown tells a more nuanced story:
- Longevity: 20/25 — 4.3 years, solid but not ancient
- Download momentum: 25/25 — 34M/week and growing fast (full marks)
- Release consistency: 20/20 — actively maintained, regular releases
- Maintainer depth: 4/15 — this is where it falls apart
- GitHub backing: 13/15 — strong
The package is well-maintained by yusukebe. It has excellent release cadence. The risk isn't abandonment — it's concentration. Everything that makes hono popular makes it a concentrated attack surface.
What this looks like in your project
If you have a package.json that depends on hono, run:
npx proof-of-commitment --file package.json
Or drop your package.json at getcommit.dev/audit.
You'll likely see hono flagged CRITICAL alongside zod (157M downloads/week, 1 maintainer) and possibly chalk (414M/week, 1 maintainer). Three packages that power most modern TypeScript projects.
What to do with this
Nothing immediately needs to change. Hono is a great framework. yusukebe is an active maintainer. But:
Know your concentrated risk. When you have sole-maintainer packages at 10M+ downloads/week in your stack, that's a dependency that warrants extra attention on security advisories.
Watch for unusual releases. The axios attack was a malicious publish — a new version that wasn't expected. Having awareness that a package is high-concentration means you pay closer attention when something unusual appears.
Consider it in your threat model. CI/CD pipelines that auto-update dependencies are particularly exposed to this class of attack.
The tool doesn't tell you to stop using hono. It tells you that hono is structurally similar to axios — and that's worth knowing.
proof-of-commitment is a zero-install CLI, GitHub Action, and MCP server for supply chain risk scoring. Try it live — pre-loaded with common packages, auto-runs on arrival.
Top comments (0)