Hardcore Exploitation and JavaScript Supply Chain Security

Security Vulnerability Reports Deep-Dives

JavaScript code backdoor’ed as part of the largest Bitcoin theft - A security audit from Verichains.io (in this X post), conducting investigative research on the $1.4 BILLION cryptocurrency hack from the Lazarus Group, with a malicious JavaScript file as part of the Safe.Global infrastructure that was compromised. Also a cool use of how the Wayback Machine helped uncover insights about the JavaScript malware code.

nextjs-bitcoin-hack

Postinstall Scripts and Firebase at the Core of ToDesktop Hack - Security researcher Eva (aka xyzeva) shares a detailed write-up on how she was able to exploit postinstall workflow as part of an infrastructure and pipeline attack to compromise the ToDesktop SDK that Cursor, Notion Calendar, and many other tech companies rely on.

eva postinstall todesktop hack

Hostname Spoofing in ionicabizau/parse-url - A security report demonstrates how parse-url parses http(s) URLs incorrectly, identifies its protocol as ssh, and its host name is also parsed incorrectly.

Given URL: https://www.google.com:x@fakesite.com:x

Terminal window
# node -e 'const parseUrl=require("parse-url");console.log(parseUrl("https://www.google.com:x@fakesite.com:x"))'
{
protocols: [ 'ssh' ],
protocol: 'ssh',
port: '',
resource: 'www.google.com',
host: 'www.google.com',
user: 'git',
password: '',
pathname: '/x',
hash: '',
search: '',
href: 'https://www.google.com:x@fakesite.com:x',
query: {},
parse_failed: false
}

And even more:

GitHub Actions Compromised

tj-actions/changed-files compromised - In a recent GitHub Actions compromise report by Palo Alto Networks, security researchers tell the story of a Coinbase targeted attack on open source repositories through third-party Actions.

Malicious VS Code Extensions

Destroyed by a Malicious VS Code Extension - On October 2024, Lorenz Lehmann shared in a tweet how his PC was nearly compromised by a malicious VS Code extension. With just one click, he installed a malicious extension that could have compromised his PC. Luckily, his PC doesn’t run on Windows.

malicious vs code extension

Supply Chain Security Risks on NPM

Cycode Finds Malicious Code Hidden in NPM Packages - On 16th of February, 2025, Cycode published a write-up with their finding of packages that contained obfuscated code on npm that communicate with a remote server

cycode finds malicious code hidden in npm packages

North Korean Lazarus group targets npm packages - Malware in package look-alikes include: is-buffer-validator, yoojae-validator, event-handle-package, array-empty-validator, react-event-dependency, and auth-validator.

Russian hackers typosquat express-exp

pdf-to-office malicious npm package

Blind File Upload Payloads

SQL Injection payloads:

'sleep(20).jpg
sleep(25)-- -.jpg

Path Traversal payloads:

../../etc/passwd/logo.png
../../../logo.png

Cross-site Scripting payloads:

-> Set file name filename="svg onload=alert(document.domain)>" , filename="58832_300x300.jpg<svg onload=confirm()>"

âť— New Security Vulnerabilities


Node.js Security Newsletter

Subscribe to get everything in and around the Node.js security ecosystem, direct to your inbox.

    JavaScript & web security insights, latest security vulnerabilities, hands-on secure code insights, npm ecosystem incidents, Node.js runtime feature updates, Bun and Deno runtime updates, secure coding best practices, malware, malicious packages, and more.