🚨 Supply Chain Shock: npm Axios Compromised, Claude Code Leaks, and the AI-Sec Inflection
TBPN•
March 31, 2026

🚨 Supply Chain Shock: npm Axios Compromised, Claude Code Leaks, and the AI-Sec Inflection

What Looked Like a Slow News Week Just Turned Critical šŸ”

While the big-tech news cycle paused for spring break retrospectives, the software and AI ecosystem faced a wave of high-severity security events. A major npm supply chain attack on Axios—one of the most widely used HTTP libraries—spilled into the open, and Anthropics Claude Code suffered a leak via a published source map file. The net effect: dependency risk, agent-era development practices, and AI-security posture are all under a very bright spotlight.


🚨 Axios npm Package: Active Supply Chain Attack

Axios, a ubiquitous HTTP client dependency across apps and services, was poisoned with malware via the npm registry. The attack compromised a developer account, slipped past standard checks, and shipped a malicious add-on masquerading as a trusted crypto library. The goal: full-system compromise and credential exfiltration.

c A tiny piece of code called Axios runs inside almost every app on your phone and every website you visit. Developers download it 100 million times a week... A few hours ago, someone poisoned it with malware that hands an attacker full control of your computer.d
c Over 173,000 other code packages plug into it... Socket, the security firm that flagged this, caught it in about 6 minutes...d

Key technicals from the forensic breakdown:

  • The attacker stole a lead developers npm login, switched to a Proton Mail address, and uploaded the poisoned versions by hand.
  • Malware was staged for at least 18 hours pre-launch, with separate builds for Windows, Mac, and Linux.
  • Both the current and an older Axios version were poisoned within 39 minutes of each other to maximize spread.
  • No lines in Axios core were changed; a fake add-on named plain crypto.js impersonated a known library and executed the payload on install.
  • The dropper deobfuscated payloads at runtime, dynamically loaded components to evade static analysis, executed shell commands, staged copies into system directories, and then deleted or renamed artifacts to erase forensic trails.

Attack surface scale:

  • Axios dependency estimates varied in commentary: 100 million weekly downloads (Anish) vs. 300 million weekly downloads (Andrej Karpathy).
  • For historical context, a 2021 hijack of UA Parser.js involved about 8 million weekly downloads.
c If you or your team run Axios, freak TF out now. Lock your version to 1.14.0. Change every password, API key, and access token on any machine that installed the compromised update. And check your network logs for connections to sfr.com or the IP address 142.1120673.d

Immediate actions for teams

  • Pin Axios to 1.14.0 and do not upgrade until cleared.
  • Audit lockfiles and dependency trees; remove any instance of the plain crypto.js add-on.
  • Rotate credentials (passwords, API keys, SSH keys, tokens) on any machine that may have installed affected versions.
  • Review network logs for suspicious connections, including the domain and IP referenced above.

AI Dev Practices Under Pressure: Defaults Must Change

c New supply chain attack... Scanning my system... luckily resolved to the previous version... but the project dependency is not pinned... Ultimately the defaults of package management projects4pip, npm, etc.4have to change so that a single injection... does not spread through users at random and at scale via unpinned dependencies.d

Package-manager defaults and organizational hygiene are center stage. Pinning, release-age constraints, containerization, and automated review gates are shifting from cvibesd to policy. The episode reinforces a dual-agent future: agents write code and agents review code, with humans-in-the-loop by default.

c There just needs to be more code review... the package was still seen within seven minutes by an automated system... People will use a coding agent to write and a coding agent to review4every time.d
c These attacks will be 10x more frequent in the age of AI. It is critical that repo maintainers start using AI for defense as well.d

Claude Code Leak: The Source Map Mistake 🧭

Separately, Claude Codes source code was exposed after a production build generated and published a map file to the npm registry, enabling effective reversal of the codebase to original sources. The leak also surfaced internal roadmap references and features4embarrassing for OpSec, impactful for copycats, but not necessarily fatal for product momentum.

c Someone ran a production build of Claude Code. The compiler generated a map filedits literally a blueprint that reverses the entire codebase back to its original sourcedand then they published it to npm for the whole world to download.d

What surfaced in community roundups:

  • Anthropic actively using Mythos for development.
  • Capy Bar: 1 million-token context window and a fast mode.
  • Model codenames referenced included Numbat and Fennec (fennec fox).
  • Undercover mode: a way to contribute to projects without revealing Claude Code usage.
  • Notably, commentary claimed that in the last 30 days, 100% of contributions to Claude Code were written by Claude Code.

On legal exposure and forks, one prominent engineering voice noted:

c This is either brilliant or scary... Anthropic accidentally leaked the source code of Claude Code... repos sharing the source are taken down with DMCA. But this repo rewrote the code using Python and so it violates no copyright and cannot be taken down.d

Bottom line: source maps belong behind strict release gates. Once published, retrieval is near-instant—npm downloads move in minutes, not days. Expect rapid DMCA activity. Also circulating is a separate ransomware-driven data sale scenario unrelated to the source-map leak, underscoring a broader ambient risk environment.


The Strategic Read: From cVibe Codingd to Verified Pipelines

  • Supply chain risk is systemic: Popular transitive dependencies multiply blast radius. Dependency graphs need pinning by default, and orgs need release-age policies to avoid installing just-published versions before scans propagate.
  • Agents everywhere, guardrails everywhere: AI-assisted coding makes velocity effortless—but magnifies the need for automated review agents, provenance checks, SBOMs, and human approval workflows.
  • Security spend likely rises: From code integrity to credential hygiene and network monitoring, the incentive to adopt next-gen AI-infused security tooling is clear.
  • Open-core vs. closed-source tension persists: The Claude Code leak illustrates how even closed projects can face open exposure via operational lapses—and how quickly communities can reimplement or adapt leaked designs.

Actionable Checklist āœ…

  • For Axios users: Pin to 1.14.0; audit lockfiles; remove suspicious add-ons (plain crypto.js); rotate credentials; check logs for connections to sfr.com and the IP 142.1120673 as noted in community guidance.
  • For all npm/pip ecosystems: Enforce pinning, enable release-age constraints, mandate code review (human + agent), and isolate builds in containers.
  • For AI-tooling orgs: Lock down build pipelines, disable source maps in production, and treat registry publishing as a security-critical surface with pre-publish scanning.

Memorable Lines

c They poisoned both the current version and an older one within 39 minutes of each other, casting the widest net possible.d
c Socket... caught it in about 6 minutes. Thats fast, but 6 minutes is still plenty of time for automated systems at companies everywhere to pull and install the bad version.d
c When a smaller package called UA Parser.js got hijacked back in 2021 with about 8 million weekly downloads... Axios has 100 million... and 173,000 packages depending on it.d

Bottom Line

Two signals cut through: dependency supply chains remain the soft underbelly of modern software, and AI-accelerated dev workflows demand equally AI-accelerated defense. Pin broadly, review relentlessly, and treat build and publish steps like production-grade security perimeters. The age of vibes is over; the age of verified pipelines is here.

More from TBPN