Thanks for bringing this up. Really scary.
But, can you clarify how the package can then be used by attackers after it's installed on your machine? If it's not referenced anywhere in the code, how can the attackers get it running in the first place?
So… Axios got hacked
Vishwajeet KondiLeader
posted
2 min read
1 Comment
Please log in to comment on this post.
More Posts
- © 2026 Coder Legion
- Feedback / Bug
- Privacy
- About Us
- Contacts
- Premium Subscription
- Terms of Service
- Refund
- Early Builders
chevron_left
More From Vishwajeet Kondi
Related Jobs
- Remote React Developer Redux Saga & Axios ExpertIT Consulting Services Inc - Makes IT Work for You · Full time · Italian Republic
- Full Stack Java/Go Developer (Bilingual English/Spanish)Dev Technology · Full time · Arlington, VA
- Language Data Annotator ( Spanish)Innova software Services Inc · Full time · Canada
Commenters (This Week)
fachremyputra
2 comments
mikhail
1 comment
Udit060
1 comment
Contribute meaningful comments to climb the leaderboard and earn badges!