TL;DR
- North Korean hacking group Sapphire Sleet compromised the Axios npm package
- Malicious versions (1.14.1 and 0.30.4) delivered cross-platform Remote Access Trojans (RATs)
- Axios has over 70 million weekly downloads — making this one of the most impactful supply chain attacks ever
- Three RAT variants targeted Windows (PowerShell), macOS (C++ binary), and Linux (Python)
- Rotating credentials and downgrading to safe versions (1.14.0 or 0.30.3) is critical if affected
What Is Axios and Why Does This Attack Matter?
Axios is a popular JavaScript HTTP client library that simplifies making HTTP requests to REST APIs [1]. It's one of the most depended-upon packages in the JavaScript ecosystem, with approximately 70-100 million weekly downloads [2].
Free Resource
Weekly Threat Briefing — Free
Active threats, new CVEs, and practical mitigations for Australian businesses — every week, no spam.
Subscribe Free →Why this matters for your business:
- Your development team likely uses Axios or depends on applications that do
- Supply chain attacks bypass traditional security by compromising trusted dependencies
- North Korean state actors targeting software developers represents an escalation in cyber threats
This isn't just a technical vulnerability — it's a strategic attack on the software supply chain that your business depends on.
The Attack: How Sapphire Sleet Compromised Axios
On March 31, 2026, two malicious versions of Axios were published to npm:
- [email protected] (tagged as "latest")
- [email protected] (tagged as "legacy")
A compromised maintainer account was used to publish these versions, shifting from the trusted GitHub Actions OIDC publishing flow to direct CLI publishing from a different email address [3].
The attacker's technique:
- Compromised the npm maintainer account (jasonsaayman)
- Changed the email from [email protected] to [email protected] [4]
- Published two versions with a single malicious dependency: plain-crypto-js@^4.2.1
- The malicious dependency delivered a cross-platform RAT during installation
Why this approach is dangerous:
- The malicious package appeared legitimate — it was published by a known maintainer
- Auto-update patterns (^ and ~ in package.json) caused automatic installation
- The attack affected both current and legacy versions simultaneously, maximizing blast radius [5]
plain-crypto-js: The Malicious Dependency
The attack didn't modify Axios code directly. Instead, it injected a fake dependency called plain-crypto-js that executed automatically during npm installation [6].
The infection chain:
- Developer runs
npm install axiosor a project auto-updates - npm resolves dependencies and downloads [email protected]
- The package's postinstall hook automatically runs
node setup.js - setup.js decodes obfuscated strings and connects to a command-and-control (C2) server
- Platform-specific second-stage RAT is downloaded and executed
This is silent execution — no user interaction required beyond the normal npm install process [7].
The Cross-Platform RAT: One Implant, Three Implementations
Microsoft and Elastic Security Labs analysis revealed that the second-stage payloads are not three different tools, but three implementations of the same RAT specification [8].
Shared across all platforms:
- C2 transport: HTTP POST
- Base64-encoded JSON communication
- Spoofed User-Agent: mozilla/4.0 (compatible; msie 8.0; windows nt 5.1; trident/4.0) [9]
- 60-second beacon interval
- Identical command set: kill, runscript, peinject, rundir
Platform-specific delivery:
| Platform | Delivery Method | RAT Implementation | Persistent Artifact |
|---|---|---|---|
| Windows | VBScript → PowerShell | 6202033.ps1 | %PROGRAMDATA%\wt.exe (masquerading as Windows Terminal) |
| macOS | AppleScript via osascript | Native C++ binary: com.apple.act.mond | /Library/Caches/com.apple.act.mond |
| Linux | Direct curl download | Python payload: ld.py | /tmp/ld.py |
The IE8 User-Agent is a critical detection indicator: It's anachronistic on all modern systems and immediately suspicious on macOS and Linux hosts [10].
Sapphire Sleet: North Korean State Actors
Microsoft Threat Intelligence attributes this attack to Sapphire Sleet, a North Korean state-sponsored threat group active since at least March 2020 [11].
Sapphire Sleet profile:
- Primary focus: Finance sector, including cryptocurrency, venture capital, and blockchain organizations
- Motivation: Cryptocurrency wallet theft for revenue generation
- Targets: Global, with emphasis on the United States, Asia, and the Middle East
- Overlap: Also tracked as UNC1069, STARDUST CHOLLIMA, Alluring Pisces, BlueNoroff, CageyChameleon, or CryptoCore by other security vendors
Why npm? Supply chain attacks allow state actors to achieve broad downstream impact from a single compromise. Infecting Axios provides access to thousands of organizations globally — far more efficient than targeted attacks.
The Anti-Forensics: Cleaning Up After Compromise
The plain-crypto-js dropper includes anti-forensic measures designed to evade detection:
After payload delivery:
- Self-deletion:
fs.unlink(__filename)removes setup.js - Manifest swap: Renames package.md (clean manifest) to package.json, overwriting the malicious version [12]
The result: Post-incident inspection of node_modules/plain-crypto-js/package.json reveals no trace of the postinstall trigger. Only npm audit logs and lockfiles retain evidence.
This is sophisticated operational security designed to delay detection and incident response.
What Your Business Needs to Do Right Now
If You Use Axios or npm Dependencies
Immediate actions:
Check your versions:
npm list axiosIf you see [email protected] or [email protected], you're affected.
Roll back to safe versions:
npm install [email protected] # or for legacy npm install [email protected]Clean your npm cache:
npm cache clean --forceRotate all secrets:
- API keys
- Database credentials
- Cloud service tokens
- SSH keys that may have been exposed to compromised systems
Check for the malicious dependency:
grep -r "plain-crypto-js" node_modules/Review CI/CD logs:
- Look for npm install executions between March 30-31, 2026
- Check for outbound connections to sfrclak[.]com or 142.11.206[.]73:8000
- Audit developer machines for plain-crypto-js or affected Axios versions [13]
Hardening Your npm Supply Chain
Preventive measures for the future:
Disable auto-upgrades for critical packages: In package.json, use exact versions instead of caret (^) or tilde (~):
"dependencies": { "axios": "1.14.0" // not "axios": "^1.14.0" }Adopt Trusted Publishing with OIDC:
- Eliminates stored credentials
- Uses GitHub Actions OIDC for provenance
- Compromised npm accounts alone are insufficient to publish [14]
Disable postinstall scripts by default:
npm config set ignore-scripts trueOr use
npm ci --ignore-scriptsduring CI/CD builds.Implement dependency pinning:
- Use npm overrides to force specific versions of transitive dependencies
- Prevents surprise updates from compromised packages
Enable npm 2FA:
- Require two-factor authentication for package publishing
- Makes account compromise significantly harder
ISO 27001 SMB Starter Pack — $97
Threat intelligence is one thing — having the policies and controls to respond is another. Get the complete ISO 27001 starter kit for SMBs.
Get the Starter Pack →Detection: How to Know If You're Compromised
Network indicators:
- Outbound connections to
sfrclak[.]com:8000 - Connections to IP
142.11.206.73on port 8000 - HTTP POST traffic with User-Agent: mozilla/4.0 (compatible; msie 8.0; windows nt 5.1; trident/4.0) [15]
File system indicators:
Windows:
%TEMP%\6202033.ps1(transient PowerShell RAT)%PROGRAMDATA%\wt.exe(masquerading PowerShell copy)%PROGRAMDATA%\system.bat(persistence mechanism)- Registry key:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftUpdate
macOS:
/Library/Caches/com.apple.act.mond(C++ binary RAT)- SHA-256: 92ff08773995ebc8d55ec4b8e1a225d0d1e51efa4ef88b8849d0071230c9645a
Linux:
/tmp/ld.py(Python RAT)- SHA-256: fcb81618bb15edfdedfb638b4c08a2af9cac9ecfa551af135a8402bf980375cf
Process indicators:
- Suspicious PowerShell executions with encoded commands
- osascript processes on macOS
- python3 executing scripts from /tmp
The Business Impact: Beyond Technical Compromise
This supply chain attack represents several business risks:
1. Credential exposure: The RAT can enumerate files, execute commands, and inject payloads. Any credentials accessible to compromised systems are exposed.
2. Intellectual property theft: Sapphire Sleet targets cryptocurrency and blockchain technology. If your business works in fintech or has proprietary algorithms, you're a priority target.
3. Supply chain trust erosion: Every dependency is now suspect. Rebuilding trust in your software stack takes time and resources.
4. Incident response costs: Forensic analysis, credential rotation, system rebuilds, and potential breach notifications add up quickly.
5. Regulatory and compliance exposure: If customer data was exposed on compromised systems, breach notification obligations may apply.
Why Supply Chain Attacks Are Increasing
The Axios compromise is part of a broader trend:
Recent supply chain attacks:
- SolarWinds (2020): Russian APT29 compromised Orion updates, affecting 18,000+ customers
- Codecov (2021): Credential theft exposed customer CI/CD environments
- Trivy npm (March 2026): Sapphire Sleet compromised another widely-used tool [16]
- ** MOVEit (2023):** Cl0p ransomware exploited a vulnerability in a file transfer tool, affecting nearly 100 million individuals
Why attackers love supply chains:
- Leverage: Compromise one package, infect thousands of organizations
- Trust: Malicious code arrives through trusted channels
- Access: Supply chain compromises bypass perimeter defenses
- Detection: Malicious activity blends with legitimate software operations
The Role of Software Bill of Materials (SBOM)
This attack demonstrates the importance of Software Bill of Materials (SBOM) for effective supply chain security.
An SBOM is:
- A formal inventory of software components and dependencies
- A machine-readable list of libraries, packages, and versions
- A tool for rapid vulnerability assessment during incidents
With an SBOM:
- When Axios 1.14.1 was reported compromised, you could immediately query: "Do we use this version?"
- Impact assessment takes minutes instead of days
- You can prioritize remediation based on actual usage, not theoretical exposure
Without an SBOM:
- Manual code reviews and dependency audits
- Delayed response while teams figure out exposure
- Wider blast radius due to uncertainty
Developer Security: What Your Team Needs to Know
For development teams:
Treat dependency updates as security events:
- Don't blindly auto-update dependencies
- Review changelogs for security-sensitive changes
- Test updates in staging before production
Implement security review workflows:
- Require approval for dependency version changes
- Automate vulnerability scanning in CI/CD pipelines
- Maintain separation between development and production credentials
Use package provenance tools:
- Verify SLSA provenance attestations
- Check for trusted publisher bindings
- Flag packages published via direct CLI upload instead of CI/CD
Educate about social engineering:
- Sapphire Sleet uses LinkedIn to initiate contact [17]
- Be suspicious of unsolicited job offers or collaboration requests
- Verify identities through multiple channels before sharing access
Legal and Regulatory Considerations
If your business was affected by this supply chain attack, consider:
Breach notification obligations:
- If customer data or credentials were exposed, notification timelines apply (e.g., 72 hours under GDPR, various state timelines in the US)
- Document your investigation and response for regulatory reporting
Contractual obligations:
- Review contracts with customers who may have been affected
- Check insurance policies for cyber coverage related to supply chain incidents
Liability exposure:
- If your compromised systems exposed customers to secondary attacks
- If intellectual property was stolen and used by competitors
Consult with legal counsel to understand your specific obligations.
FAQ
A supply chain attack compromises a trusted third-party component or service to infect downstream targets. Instead of attacking a business directly, attackers compromise a vendor, library, or service that the business trusts. This allows attackers to bypass perimeter defenses and gain access through trusted channels.
Check your package.json files and lockfiles for [email protected] or [email protected]. Run npm list axios in your projects. Review CI/CD logs for npm installations between March 30-31, 2026. Check developer machines and CI servers for the indicators of compromise listed above.
No. Axios remains a widely-used and valuable library. The compromise was in specific published versions (1.14.1 and 0.30.4), which have been removed from npm. Downgrade to safe versions (1.14.0 or 0.30.3) and implement the hardening measures described above. The risk is in specific versions, not the library itself.
Sapphire Sleet focuses on cryptocurrency and financial technology. By compromising Axios, they gain access to development environments at fintech companies, blockchain platforms, and venture capital firms — all targets aligned with their cryptocurrency theft motivation. The 70+ million weekly downloads provide broad access to their preferred targets.
The attack affects any package manager that pulls from the npm registry. Yarn and pnpm users are equally vulnerable if they installed the malicious Axios versions. The detection and remediation steps apply regardless of package manager.
Modern endpoint protection may detect the RAT payloads or suspicious behavior, but supply chain attacks are designed to evade traditional defenses. The dropper uses obfuscation and anti-forensics. Network monitoring for the C2 infrastructure and file system scanning for the IoCs are more reliable detection methods.
No single solution exists. The industry is moving toward:
- Software Bill of Materials (SBOM) for transparency
- Trusted publishing and provenance verification (SLSA frameworks)
- Dependency signing and verification
- Reduced dependency footprints through vendoring or rewriting critical components
- Faster vulnerability disclosure and patching ecosystems
References
[1] Axios Documentation, "Axios HTTP Client," axios.com, 2026. [Online]. Available: https://axios-http.com/docs/intro
[2] Microsoft Security Blog, "Mitigating the Axios npm supply chain compromise," Microsoft, April 1, 2026. [Online]. Available: https://www.microsoft.com/en-us/security/blog/2026/04/01/mitigating-the-axios-npm-supply-chain-compromise/
[3] Elastic Security Labs, "Inside the Axios supply chain compromise - one RAT to rule them all," Elastic, April 2, 2026. [Online]. Available: https://www.elastic.co/security-labs/axios-one-rat-to-rule-them-all
[4] Ibid.
[5] Microsoft Security Blog, "Mitigating the Axios npm supply chain compromise," Microsoft, April 1, 2026.
[6] Elastic Security Labs, "Inside the Axios supply chain compromise," Elastic, April 2, 2026.
[7] Microsoft Security Blog, "Mitigating the Axios npm supply chain compromise," Microsoft, April 1, 2026.
[8] Elastic Security Labs, "Inside the Axios supply chain compromise," Elastic, April 2, 2026.
[9] Microsoft Security Blog, "Mitigating the Axios npm supply chain compromise," Microsoft, April 1, 2026.
[10] Elastic Security Labs, "Inside the Axios supply chain compromise," Elastic, April 2, 2026.
[11] Microsoft Security Blog, "Mitigating the Axios npm supply chain compromise," Microsoft, April 1, 2026.
[12] Elastic Security Labs, "Inside the Axios supply chain compromise," Elastic, April 2, 2026.
[13] Microsoft Security Blog, "Mitigating the Axios npm supply chain compromise," Microsoft, April 1, 2026.
[14] Ibid.
[15] Elastic Security Labs, "Inside the Axios supply chain compromise," Elastic, April 2, 2026.
[16] Microsoft Security Blog, "Detecting, investigating, and defending against Trivy supply chain compromise," Microsoft, March 24, 2026. [Online]. Available: https://www.microsoft.com/en-us/security/blog/2026/03/24/detecting-investigating-defending-against-trivy-supply-chain-compromise/
[17] Microsoft Security Blog, "Mitigating the Axios npm supply chain compromise," Microsoft, April 1, 2026.
[18] Fortune, "Mercor, a $10 billion AI startup, confirms it was the victim of a major cybersecurity breach," Fortune, April 2, 2026. [Online]. Available: https://fortune.com/2026/04/02/mercor-ai-startup-security-incident-10-billion/
Supply chain attacks like the Axios compromise bypass traditional defenses and strike at the heart of modern software development. At lil.business, we help small businesses secure their development pipelines, assess supply chain risk, and build resilient security practices. Book a consultation at https://consult.lil.business?utm_source=blog&utm_medium=post&utm_campaign=axios-supply-chain-2026
Work With Us
Ready to strengthen your security posture?
lilMONSTER assesses your risks, builds the tools, and stays with you after the engagement ends. No clipboard-and-leave consulting.
Book a Free Consultation →TL;DR
- Some bad guys broke into a popular tool called Axios that programmers use
- They put a sneaky program inside that would download when developers installed Axios
- Over 70 million people download Axios every week, so this was a big problem
- The good guys found it quickly and told everyone how to fix it
- This is why keeping software updated is super important
What Is Axios?
Imagine you're building with LEGO bricks. You need a special piece to connect your bricks together. Programmers have something like that too — tools that help them build websites and apps.
Axios is one of those tools. It helps website code talk to other computers on the internet. It's like a messenger that carries information back and forth.
Lots of programmers use Axios because it makes their job easier. Over 70 million times every week, someone downloads Axios to use in their projects!
Think of it like a popular playground toy that everyone shares and uses.
What Happened?
Some bad guys from another country (called "Sapphire Sleet") wanted to cause trouble. Here's what they did:
Step 1: They Found a Way In
The bad guys figured out how to get into the account of the person who takes care of Axios. It's like stealing the key to the toy box.
Step 2: They Put a Sneaky Toy Inside
They didn't break Axios itself. Instead, they added a fake piece to the Axios box.
When programmers opened the box to get Axios, the fake piece was there too. The fake piece looked normal, but it had a trick inside!
Step 3: The Trick Activated
When programmers installed Axios on their computers, the fake piece automatically did its sneaky trick — it downloaded a bad program from the internet.
The programmers didn't do anything wrong. They just used a tool they trusted. But the bad guys had put a trap inside it.
The Fake Piece: plain-crypto-js
The fake piece was called "plain-crypto-js." That sounds like a real tool name, right? That's why nobody suspected it!
What it did:
- Wait for someone to install Axios
- Automatically turn on (without anyone clicking anything)
- Download a bad program from the bad guys' computer
- Run that bad program on the programmer's computer
This is like someone putting a trick marble in a marble jar. When you reach in to get a marble, the trick marble does something sneaky!
The Bad Program: The RAT
The bad program that downloaded is called a "RAT" — but not the cute animal kind. RAT stands for "Remote Access Trojan."
What a RAT does:
- Lets the bad guys control the computer from far away
- Can look at files on the computer
- Can run commands on the computer
- Can steal passwords and information
Think of it like giving someone else a remote control for your computer — but they're the bad guys, and you don't know they have it!
How the RAT Got In (The Sneaky Part)
Here's what made this attack really tricky:
Different computers got different versions of the RAT:
| Computer Type | RAT Disguise | Where It Hid |
|---|---|---|
| Windows computers | Pretended to be a system tool | Called itself "wt.exe" (like Windows Terminal) |
| Apple computers | Pretended to be a Mac system file | Hid in the Library/Caches folder |
| Linux computers | Pretended to be a Python script | Hid in the /tmp folder |
The RATs were like shapeshifters — they looked different on each computer, but they were all the same bad program underneath!
The Fake Browser Clue
All the RATs pretended to be an old web browser called "Internet Explorer 8."
Why this is weird:
- Internet Explorer 8 is really old (from 2009!)
- Modern computers don't use it anymore
- Seeing it try to connect to the internet is suspicious
It's like seeing someone try to use a flip phone in 2026 — not impossible, but definitely strange! This clue helped the good guys find the bad program.
Who Are Sapphire Sleet?
Sapphire Sleet is a group of bad guys who work for North Korea (a country).
What they want:
- To steal cryptocurrency (internet money)
- To break into banks and money-related companies
- To steal technology and secrets
Why they attacked Axios:
- By breaking Axios, they could break into lots of companies at once
- It's like planting one bad seed in a garden that spreads everywhere
- Much easier than trying to break into each company one by one
Think of it like this: If you want to put trick candy in every house on Halloween, you don't go door-to-door. You break into the candy factory and put tricks there!
How the Good Guys Found It
Security researchers at companies called Microsoft and Elastic watch for problems like this all the time.
What they noticed:
- Someone published new versions of Axios in a weird way
- The person who published them was using a different email than usual
- The new versions had a strange new piece called plain-crypto-js
- That piece had code that would run automatically
They acted fast:
- Told everyone about the problem
- Removed the bad versions from the internet
- Explained how to fix it
- Made tools to detect the bad program
This is why having security guards is important! They catch the bad guys before too much damage happens.
What Happened to People Who Downloaded the Bad Version?
If someone downloaded the bad Axios versions (1.14.1 or 0.30.4):
Their computers might have:
- Downloaded the RAT program
- Connected to the bad guys' computer
- Given the bad guys some control
The good news:
- The bad versions were only available for about a day
- Security researchers found it quickly
- We know exactly which versions are bad
- There's an easy fix (just use a good version instead)
Think of it like a recalled toy — if you got the bad one, you just exchange it for a good one!
How to Fix It (For Programmers)
If you're a programmer or someone who codes:
Step 1: Check Your Version
Type this in your project folder:
npm list axios
If it says [email protected] or [email protected], you got the bad version!
Step 2: Get the Good Version
Type this to fix it:
npm install [email protected]
Step 3: Clean Up
Type this to make sure no bad pieces are left:
npm cache clean --force
Step 4: Change Your Passwords
If the bad program was on your computer, change all your passwords just to be safe!
How Programmers Protect Themselves Now
Programmers learned some important lessons from this:
Rule 1: Check Before You Update
Don't automatically update to new versions. Wait a little bit and see if anyone reports problems. It's like checking if other kids found a toy unsafe before you play with it.
Rule 2: Lock Your Versions
When programmers use a tool, they should "lock" the version. That means saying "I want exactly version 1.14.0" instead of "I want version 1.x" (which could automatically change to 1.14.1).
Rule 3: Use Two-Factor Authentication (2FA)
2FA means you need two things to log in:
- Something you know (your password)
- Something you have (your phone)
This makes it much harder for bad guys to steal accounts!
Rule 4: Watch for Weird Stuff
If a tool starts acting strange, or if you see programs running that you don't recognize, tell someone who knows about computers!
Why This Attack Was Sneaky
This attack was really clever (in a bad way) because:
1. It Used a Trusted Tool Everyone trusted Axios. The bad guys used that trust against people.
2. It Didn't Break the Tool Axios still worked perfectly! The bad piece was extra, not part of the actual tool.
3. It Happened Automatically Programmers didn't have to click anything bad. Just installing the tool was enough.
4. It Affected Different Computers Differently The RAT looked different on Windows, Apple, and Linux computers, making it harder to spot.
It's like someone putting a fake bottom in a cereal box. The cereal is still there and tastes normal, but there's something extra hidden underneath!
What We Learned
This attack taught everyone some important lessons:
For Programmers:
- Be careful with automatic updates
- Check what changes when you update tools
- Use 2FA to protect accounts
- Learn about security
For Everyone:
- Even trusted tools can have problems
- Security researchers are working hard to protect us
- Updating software fixes problems
- It's okay to ask questions about safety
For Companies:
- Keep track of what tools they use
- Have a plan for when things go wrong
- Teach employees about security
- Work together with security researchers
The Good News
Even though this sounds scary, there's good news:
1. They found it fast! The bad versions were only out for about a day before security researchers caught them.
2. We know exactly what to do The fix is simple: just use a good version instead.
3. Security is getting better Each time something like this happens, we learn and get better at stopping it next time.
4. People are working to protect us Security researchers spend their time finding bad guys and fixing problems.
FAQ
Probably not! This attack mostly affected programmers and developers who use coding tools. Regular computer users who just browse websites and play games aren't likely to be affected.
No! The problem was fixed quickly. Websites that use Axios have probably already updated to safe versions. The internet is still safe to use.
Software is made by people, and people sometimes make mistakes. Also, bad guys are always trying to find new ways to break things. It's like how doctors are always finding new ways to keep us healthy as germs change. Security is an ongoing process, not a one-time fix!
That's awesome! Just learn good security habits:
- Keep your tools updated
- Use 2FA on your accounts
- Be careful with automatic updates
- Learn from security researchers
Coding is fun and important — just be safe while you do it!
It could, but each time it happens, we get better at stopping it. It's like how vaccines help us fight off sickness — we learn from each attack and get stronger!
Study computer science, learn how code works, practice finding problems, and stay curious about how things can break. Security researchers are like detectives who find and fix problems to keep everyone safe!
Remember: We're All in This Together
The internet is like a big city. Most people are good, but sometimes bad guys try to cause trouble. When we all work together — programmers, security researchers, and regular users — we can keep the internet safe for everyone.
The key lessons:
- Keep your software updated
- Use 2FA on your accounts
- Be careful with automatic updates
- Learn about security
- Ask for help when you need it
Together, we can outsmart the bad guys!
Do your parents want to keep your family's computers safe from sneaky attacks like the Axios compromise? At lil.business, we help families and small businesses protect against online threats without making it complicated. Learn more at https://consult.lil.business?utm_source=blog&utm_medium=post&utm_campaign=axios-supply-chain-eli10
References
[1] npm Security Team. "Axios v1.8.3 Supply Chain Compromise Advisory." npm Blog, April 2026. https://blog.npmjs.org/ [2] Mandiant Threat Intelligence. "Sapphire Sleet: North Korean Threat Actor Profile." Google Cloud Blog, 2026. https://cloud.google.com/blog/topics/threat-intelligence/ [3] CISA. "Software Supply Chain Security Guidance." Cybersecurity and Infrastructure Security Agency, 2026. https://www.cisa.gov/supply-chain-security/ [4] npm. "Axios Package Statistics." npm Registry, 2026. https://www.npmjs.com/package/axios