Axios Supply Chain Attack โ€” What OpenClaw Users Need to Know

Axios Supply Chain Attack โ€” What OpenClaw Users Need to Know

Axios Supply Chain Attack โ€” What OpenClaw Users Need to Know

By Pedro Jose ยท March 31, 2026 ยท 6 min read ยท Supply Chain, OpenClaw, Security Alert
๐Ÿšจ URGENT โ€” If you installed Axios versions 1.14.1 or 0.30.4 in the last 24 hours, read this.

Axios โ€” the HTTP client with 83 million weekly downloads โ€” has been compromised. Attackers stole the primary maintainer’s npm credentials and published two malicious versions that drop a cross-platform RAT (Remote Access Trojan).

Here’s what happened, why it matters for OpenClaw users, and exactly what you need to do.

What Happened

  • Compromised account: “jasonsaayman” โ€” the primary Axios maintainer
  • Malicious versions: axios@1.14.1 and axios@0.30.4
  • Method: Injected a fake dependency called plain-crypto-js@4.2.1
  • Payload: A postinstall script that drops a cross-platform RAT
  • Cover-up: The malware deletes itself and replaces its own package.json to evade detection
“Neither malicious version contains a single line of malicious code inside Axios itself. Instead, both inject a fake dependency whose only purpose is to run a postinstall script that deploys a RAT.” โ€” StepSecurity

Why This Hits OpenClaw Users Hard

Two OpenClaw-related packages were also compromised in this attack:

  • @shadanai/openclaw โ€” vendors the malicious plain-crypto-js payload directly
  • @qqbrowser/openclaw-qbot@0.0.130 โ€” ships tampered axios@1.14.1 with the malicious dependency

If you installed any of these โ€” or if your OpenClaw setup pulled the malicious Axios versions โ€” your system may be compromised.

How the Attack Works

For macOS

Runs an AppleScript payload to fetch a trojan binary from sfrclak.com:8000, saves it as /Library/Caches/com.apple.act.mond, makes it executable, and launches it in the background.

For Windows

Copies PowerShell to %PROGRAMDATA%\wt.exe (disguised as Windows Terminal), writes a VBScript to fetch a PowerShell RAT, and executes it.

For Linux

Runs a shell command to fetch a Python RAT from the same server, saves it as /tmp/ld.py, and executes it via nohup.

โœ… What You Need to Do Right Now

  • Check your Axios version: npm list axios
  • If you have 1.14.1 or 0.30.4: Downgrade immediately to 1.14.0 or 0.30.3
  • Remove plain-crypto-js: Delete it from your node_modules folder
  • Check for RAT artifacts:
    • macOS: /Library/Caches/com.apple.act.mond
    • Windows: %PROGRAMDATA%\wt.exe
    • Linux: /tmp/ld.py
  • If you find any artifacts: Assume compromise and rotate ALL credentials
  • Check your CI/CD pipelines: Audit any runs that installed affected versions
  • Block egress traffic to sfrclak[.]com

What This Means for Your OpenClaw Agents

If your OpenClaw agent runs on a machine that installed the malicious Axios versions, the attacker could have:

  • Stolen your API keys (OpenAI, Twilio, ElevenLabs, etc.)
  • Gained access to your agent’s configuration files
  • Pivoted to your internal network
  • Compromised your CI/CD pipeline

This is why supply chain security matters. The code you trust can be weaponized overnight.

“This was not opportunistic. The malicious dependency was staged 18 hours in advance. Three separate payloads were pre-built for three operating systems. Both release branches were hit within 39 minutes. Every trace was designed to self-destruct.”

How to Verify You’re Safe

  1. Run npm list axios in all your projects
  2. Check for plain-crypto-js in your node_modules
  3. Look for the RAT artifacts listed above
  4. Review your npm audit logs for March 30-31, 2026

Long-Term Protection

  • Pin your dependencies โ€” don’t use ^ or ~ for critical packages
  • Use npm package signatures โ€” verify publisher integrity
  • Audit your supply chain โ€” know what’s in your node_modules
  • Monitor for compromised credentials โ€” rotate tokens regularly
  • Run dependency scanning โ€” use tools like Socket or Snyk

๐Ÿฆž Need help securing your OpenClaw agents?

I audit OpenClaw deployments, test for supply chain vulnerabilities, and harden your agent infrastructure.

๐Ÿ”’ Book a Security Audit โ†’
๐Ÿฆž Stack of Truths โ€” AI-Powered Security Audits ยท OpenClaw Hardening ยท Supply Chain Security
Cyber Flex Consultant | KVK 94992266 | Keurenplein 41, 1069CD Amsterdam
๐Ÿ“ง info@stackoftruths.com | ๐Ÿฆ @StackOfTruths | ๐Ÿ”— stackoftruths.com

Oh hi there ๐Ÿ‘‹
Itโ€™s nice to meet you.

Sign up to receive awesome content in your inbox, every month.

We donโ€™t spam! Read our privacy policy for more info.

Leave a Reply

Your email address will not be published. Required fields are marked *


You cannot copy content of this page

error

Enjoy this blog? Please spread the word :)

Follow by Email
YouTube
YouTube
LinkedIn
LinkedIn
Share
Telegram