Reports around the compromised axios release led developers to share minimum-release-age checks, scanner setups, and review-bot coverage after Cognition said Devin Review warned some customers before public disclosure. The response turns install-time package policy and automated review into practical defenses for dependency pipelines.

axios@1.14.1 release pushed engineers into incident mode because it looked like installer malware, not a normal bad publish. Early warnings centered on pinning, freezing upgrades, and checking CI/CD installs early compromise warning.axios@1.14.1 went live at 00:21 UTC and was removed by 03:29 UTC, and Vercel said it blocked outbound access from its build infrastructure to the known C2 hostname while advising customers to audit lockfiles and node_modules Vercel investigation, Karpathy commentary.min-release-age setting and similar install-time delays so fresh releases cannot hit production the minute they appear min-release-age defense, team response.The weird part of this story is how fast the defensive playbook snapped into place. Vercel's incident note reads like a cloud-provider containment checklist. Snyk's writeup nails down the timeline and payload chain. npm had already added a min-release-age config, and the axios scare immediately gave it a real use case. Even the scanner rush became part of the story, with developers reporting a run on Socket signups.
The core fact pattern settled quickly. According to Snyk's analysis, the bad versions were axios@1.14.1 and axios@0.30.4, published from a hijacked maintainer account, with a malicious plain-crypto-js@4.2.1 dependency that used postinstall to fetch a cross-platform RAT.
That matters because many teams still think exposure starts when a vulnerable package ships into production. In this case, exposure started at install time. Fresh npm install runs, CI jobs, preview deployments, and lockfile refreshes were the danger zone. Vercel's response makes that concrete: block egress to the known host, then tell customers to inspect lockfiles and installed modules, not just source code.
The official axios repo acknowledged the compromise in issue #10604, which is the page many engineers will want to bookmark because it ties the ecosystem panic back to the upstream project.
The most useful operational takeaway from the response is simple: stop installing brand-new releases automatically.
npm added min-release-age in February. The setting makes npm resolve only versions that have been available for more than a configured number of days. That is exactly the sort of cooldown this incident rewarded. A seven-day delay would have skipped the bad axios publish entirely for a lot of teams.
If you run mixed-language infrastructure, the same idea is showing up elsewhere. uv documents an --exclude-newer option that limits resolution to packages published before a chosen date. Different syntax, same principle: time is a security control.
This is the real story here. Supply chain defense is moving earlier in the pipeline, from "scan after install" to "refuse the release while it is still hot." That is a much better default for packages with huge transitive reach.
Cognition's claim is the sharpest non-obvious reveal in the evidence set: Devin Review reportedly flagged the axios compromise for multiple customers before the attack was publicly announced.
If that holds up, review bots deserve to be treated as dependency tripwires, not just code-quality helpers. They see pull requests, lockfile churn, dependency additions, and generated diffs in the same place developers already work. That gives them a shot at catching suspicious changes before dedicated security tooling finishes triage.
swyx made the right argument afterward. A generalist reviewer does not replace dedicated security tooling, but it adds cheap attention where humans usually miss small, weird changes. Dependency incidents are full of small, weird changes.
Developers did not respond to axiosgate with a single silver bullet. They started assembling a stack:
min-release-age or similar package-age rulesnode_modules audits, as Vercel advised in its incident noteThat combination is better than any single control. Package-age policy reduces exposure to fresh compromises. Scanners look for dangerous behavior. Review bots watch the diffs humans stop reading carefully after the tenth dependency bump of the week.
The axios compromise hit a nerve because it attacked a default habit: trusting routine installs. Teams were already pinning for reproducibility and using scanners for known bad packages. After this incident, they started talking about dependency installs more like email attachments or production deploys, meaning delayed, inspected, and watched.
That is a healthier model. A package ecosystem with 100M-plus download libraries does not fail safely when the first line of defense is "hope someone notices on X in time." The teams that came out of this looking prepared were the ones with friction in the pipeline, not the ones with the fastest upgrades.
axios may be under active supply chain compromise. The newest release reportedly pulls in a brand-new dependency that behaves like installer malware: runtime deobfuscation, shell execution, temp-dir staging, artifact cleanup. If you use axios: pin now freeze upgrades audit Show more
🚨 CRITICAL: Active supply chain attack on axios -- one of npm's most depended-on packages. The latest axios@1.14.1 now pulls in plain-crypto-js@4.2.1, a package that did not exist before today. This is a live compromise. This is textbook supply chain installer malware. axios
The Vercel security and compute teams have conducted an investigation into the malicious takeover of the 𝚊𝚡𝚒𝚘𝚜@𝟷.𝟷𝟺.𝟷 npm package. • We’ve blocked outgoing access from our build infrastructure to the Command & Control hostname 𝚜𝚏𝚛𝚌𝚕𝚊𝚔.𝚌𝚘𝚖. • The malicious Show more
do this to protect yourself against supply chain attacks $ cat ~/.npmrc min-release-age=7 $ cat ~/.config/uv/uv.toml exclude-newer = "7 days"
We dodged the bullet thankfully but this is the type of stuff that keeps you up at night Gonna do pinning, min dependency age. Probably sign up for socket and put them in GitHub. We use @bunjavascript and they have a security scanner api that socket integrates with so gonna Show more
Devin Review caught the axios supply chain attack for multiple Cognition customers before the attack was publicly known. These attacks will be 10x more frequent in the age of AI; it is critical that repo maintainers start using AI for defense as well. (showing one example below Show more
this customer got notified 45 mins after attack, 1.5 hours before announcement of the attack. Generalist coding agent is also a better security reviewer than you! there is basically 0 reason not to have a Review bot enabled for all the things. it’s not just a security thing, Show more
Devin Review caught the axios supply chain attack for multiple Cognition customers before the attack was publicly known. These attacks will be 10x more frequent in the age of AI; it is critical that repo maintainers start using AI for defense as well. (showing one example below
We dodged the bullet thankfully but this is the type of stuff that keeps you up at night Gonna do pinning, min dependency age. Probably sign up for socket and put them in GitHub. We use @bunjavascript and they have a security scanner api that socket integrates with so gonna Show more
tried to sign up for @SocketSecurity but it seems to be not working - too much load from all the new sign-ups after axiosgate?
New supply chain attack this time for npm axios, the most popular HTTP client library with 300M weekly downloads. Scanning my system I found a use imported from googleworkspace/cli from a few days ago when I was experimenting with gmail/gcal cli. The installed version (luckily) Show more
🚨 CRITICAL: Active supply chain attack on axios -- one of npm's most depended-on packages. The latest axios@1.14.1 now pulls in plain-crypto-js@4.2.1, a package that did not exist before today. This is a live compromise. This is textbook supply chain installer malware. axios
Devin Review caught the axios supply chain attack for multiple Cognition customers before the attack was publicly known. These attacks will be 10x more frequent in the age of AI; it is critical that repo maintainers start using AI for defense as well. (showing one example below Show more