Follow-up reporting says review bots warned some teams before the public axios disclosure, while Vercel and developers published investigation details and install-time mitigations. The incident remains a concrete reference point for package trust, CI policy, and dependency-age controls.

axios@1.14.1 describe a supply-chain compromise with install-time behavior that looked like malware, including “runtime deobfuscation,” “shell execution,” temp-dir staging, and cleanup, according to the initial warning.axios@1.14.1 npm package, turning the incident from rumor into an active response case for dependency consumers the Vercel repost.min-release-age=7, with developers also discussing review bots and package scanners as first-line checks the mitigation post a developer reaction.The core claim is that axios@1.14.1 was not just buggy but hostile at install time. In the warning thread, the reported behavior included “runtime deobfuscation,” “shell execution,” “temp-dir staging,” and “artifact cleanup,” which is why the post framed it as “installer malware” rather than a normal package regression. The same thread stressed the blast radius by pointing to axios’s “100M+ weekly downloads.”
Posts amplifying Vercel’s response pushed the story from community alarm into incident handling. A repost of Vercel’s investigation note says Vercel’s security and compute teams investigated the “malicious takeover” of the axios@1.14.1 npm package, which is the strongest evidence here that major downstream users were treating the package as compromised, not merely suspicious.
A separate development is that review automation appears to have surfaced the issue before the wider disclosure cycle. The repost in the Cognition claim says Devin Review caught the axios supply-chain attack for multiple customers before it was publicly known. That timing is echoed by swyx’s summary, which says one customer was notified 45 minutes after the attack and about 1.5 hours before the public announcement, while also cautioning that “cant beat dedicated tools of course.”
The first operational change was to slow package adoption. In the mitigation thread, the concrete example is npm’s min-release-age=7, paired with equivalent delay controls in uv config, as a way to avoid pulling a just-published package into CI and production immediately. That sits alongside the more basic containment advice from the original alert: pin now, freeze upgrades, audit lockfiles, and inspect CI/CD installs.
Developer reactions show these controls moving from nice-to-have to default policy. One engineer wrote in a practitioner post that the team would do “pinning, min dependency age,” then add Socket plus Bun’s security-scanner integration into GitHub configuration after narrowly avoiding impact.
The incident also sharpened the case for automated review on dependency changes. In the review-bot post, the takeaway is blunt: there is “basically 0 reason not to have a Review bot enabled,” with the argument that a generalist coding agent can catch unusual changes earlier even if dedicated security tools remain the primary control. That view was reinforced by the axios example because the claimed early warnings were tied to review automation rather than a public advisory cycle.
axios may be under active supply chain compromise. The newest release reportedly pulls in a brand-new dependency that behaves like installer malware: runtime deobfuscation, shell execution, temp-dir staging, artifact cleanup. If you use axios: pin now freeze upgrades audit Show more
🚨 CRITICAL: Active supply chain attack on axios -- one of npm's most depended-on packages. The latest axios@1.14.1 now pulls in plain-crypto-js@4.2.1, a package that did not exist before today. This is a live compromise. This is textbook supply chain installer malware. axios
Devin Review caught the axios supply chain attack for multiple Cognition customers before the attack was publicly known. These attacks will be 10x more frequent in the age of AI; it is critical that repo maintainers start using AI for defense as well. (showing one example below Show more
do this to protect yourself against supply chain attacks $ cat ~/.npmrc min-release-age=7 $ cat ~/.config/uv/uv.toml exclude-newer = "7 days"
We dodged the bullet thankfully but this is the type of stuff that keeps you up at night Gonna do pinning, min dependency age. Probably sign up for socket and put them in GitHub. We use @bunjavascript and they have a security scanner api that socket integrates with so gonna Show more