返回顶部
c

check-axios-malware

Check if the local machine is infected by the malicious axios supply-chain attack (axios 1.14.1/0.30.4 via plain-crypto-js@4.2.1). Use when: user asks about npm security, axios malware, supply-chain infection check, or OpenClaw 2026.3.28 safety. NOT for: remote host scanning, static code analysis.

作者: admin | 来源: ClawHub
源自
ClawHub
版本
V 1.0.0
安全检测
已通过
63
下载量
1
收藏
概述
安装方式
版本历史

check-axios-malware

# Check Axios Malware Scan the local machine for indicators of compromise from the malicious axios supply-chain attack (March 2026). ## When to Use ✅ **USE this skill when:** - "是否中了恶意axios" / "npm supply-chain attack check" - "check if plain-crypto-js is installed" - "OpenClaw 2026.3.28 安全排查" - "本机是否被供应链攻击感染" ❌ **DON'T use this skill when:** - Remote host scanning → use nmap / nuclei - Static code analysis → use semgrep - Binary malware analysis → use VirusTotal ## Background In March 2026, axios versions **1.14.1** and **0.30.4** were trojaned via `plain-crypto-js@4.2.1` as a dependency. The malicious `postinstall` script delivered a cross-platform backdoor. OpenClaw `2026.3.28` used `axios@^1.7.4` in optionalDependencies and was at risk during the attack window. ## IOC Summary | Indicator | Safe | Compromised | |-----------|------|-------------| | `plain-crypto-js` dir | absent | **present = infected** | | axios version | any except 1.14.1 / 0.30.4 | 1.14.1 or 0.30.4 | | suspicious process | none | curl/wget/nc in background | ## Commands ### 1. Check for plain-crypto-js (primary IOC) ```bash find /home /root /usr/local /tmp -name "plain-crypto-js" -type d 2>/dev/null ``` Any result = **compromised**. Stop here and rotate all credentials. ### 2. Scan all installed axios versions ```bash find / -path "*/node_modules/axios/package.json" 2>/dev/null | \ xargs -I{} python3 -c " import json d = json.load(open('{}')) v = d.get('version','?') flag = '❌ MALICIOUS' if v in ['1.14.1','0.30.4'] else '✅ safe' print(flag, v, '{}') " 2>/dev/null ``` ### 3. Check OpenClaw version ```bash python3 -c "import json; d=json.load(open('$HOME/.npm-global/lib/node_modules/openclaw/package.json')); print('openclaw', d['version'])" 2>/dev/null || echo "openclaw not found" ``` `2026.3.28` = at-risk version (check axios version above to confirm). ### 4. Check for suspicious background processes ```bash ps aux | grep -E "(curl|wget|nc |ncat|bash -i|/tmp/[^ ]+)" | grep -v grep ``` ### 5. Check established network connections ```bash ss -tnp | grep ESTABLISHED ``` ### 6. Check for persistence (crontab, rc files) ```bash crontab -l 2>/dev/null tail -20 ~/.bashrc ~/.profile ~/.zshrc 2>/dev/null ``` ## Incident Response If any IOC is found: 1. **Rotate all credentials** on this machine (API keys, SSH keys, tokens) 2. Remove the malicious package: `rm -rf /path/to/plain-crypto-js` 3. Reinstall clean dependencies: `rm -rf node_modules && npm install` 4. Restart OpenClaw: `openclaw daemon restart` 5. Review recent outbound connections in system logs ## Reference Advisory: https://www.panewslab.com/zh/articles/019d42da-491d-70b7-b00b-b14e59b97f80

标签

skill ai

通过对话安装

该技能支持在以下平台通过对话安装:

OpenClaw WorkBuddy QClaw Kimi Claude

方式一:安装 SkillHub 和技能

帮我安装 SkillHub 和 check-axios-malware-1775914561 技能

方式二:设置 SkillHub 为优先技能安装源

设置 SkillHub 为我的优先技能安装源,然后帮我安装 check-axios-malware-1775914561 技能

通过命令行安装

skillhub install check-axios-malware-1775914561

下载 Zip 包

⬇ 下载 check-axios-malware v1.0.0

文件大小: 2.32 KB | 发布时间: 2026-4-12 09:21

v1.0.0 最新 2026-4-12 09:21
Initial release: scan local machine for axios supply-chain attack IOCs (plain-crypto-js@4.2.1, axios 1.14.1/0.30.4, March 2026)

Archiver·手机版·闲社网·闲社论坛·羊毛社区· 多链控股集团有限公司 · 苏ICP备2025199260号-1

Powered by Discuz! X5.0   © 2024-2025 闲社网·线报更新论坛·羊毛分享社区·http://xianshe.com

p2p_official_large
返回顶部