The decision brain
Four signals. One verdict.
~80 milliseconds.
Every install request runs all four detection signals in parallel against two
databases (1.1M vulnerabilities, 72K npm packages with behavioral baselines).
We aggregate the strongest signal into one of four decisions.
A
New Dependency Injection
Catches a brand-new transitive dependency that never existed in any
prior version of the package. The classic compromise pattern.
quarantine
Fires when the new minor version is ≥3 ahead of the last known minor
within the same major. Pre-release suffixes are stripped first.
quarantine
C
Known Malicious Package
Cross-checks the human-verified attack corpus + 14K malware advisories + 16
attack campaigns mapped to MITRE ATT&CK TTPs. Hard block.
block
D
Vulnerability Feed Match
Live advisory match with semver-range evaluation. Critical severity triggers block,
high triggers alert, otherwise informational.
block
alert
Tarball content scan
Every .tgz is buffered (≤5 MB), package.json
install scripts extracted, and 11 supply-chain patterns run against them
(eval, env exfil, base64+eval, SSH-key write, webhook exfil, reverse shell,
crypto mining…). Adds ~50–200 ms.
SBOM ingestion
POST /api/v1/proxy/sbom accepts CycloneDX or SPDX and runs the
whole graph through the brain at once. Perfect for compliance gates.
MITRE ATT&CK enrichment
Every confirmed malicious package is auto-tagged with TTPs (T1195.002,
T1059.007, T1567.002…) so SOC teams get a pre-built incident report.
Live attack · case study
How CyberXYZ caught
axios@1.14.1 on day zero.
The maintainer account jasonsaayman was compromised. A malicious
version was pushed to npm. 43 minutes later it was downloaded
37,000 times. Here's exactly what the brain did, in order, in milliseconds.
-
T+0s
npm publish axios@1.14.1
Compromised maintainer pushes a new version to registry.npmjs.org.
No CVE filed. CVSS unknown. EPSS unknown.
-
T+15s
xyz-npm-watcher polls the registry
Cloud Run job polling 189 Tier-1 packages every 15 minutes catches the
new version. Onboards it into version_compatibility.
-
T+18s
Signal A fires · new dependency injection
A runtime dependency that has never existed in any prior version
of axios is now present. Verdict: quarantine.
-
T+18s
Signal B fires · version-jump anomaly
Last seen minor: 1.9. New minor: 1.14. Jump = 5. Threshold = 3.
Verdict: quarantine.
-
T+12m
Human verification → Signal C upgraded to block
Analyst confirms the RAT dropper. malicious_packages entry
marked verified_by_human=TRUE. is_malicious_version()
now hard-blocks 1.14.1 globally.
-
T+12m
Every install request → 403
Across all CyberXYZ customers, every npm install axios@1.14.1
through the proxy returns 403 BLOCK. Every CI gate fails.
Every VSCode session shows the red badge. Every CLI exits 1.
-
T+1h
MITRE ATT&CK enrichment
Auto-tagged: T1195.002 Compromise Software Supply Chain,
T1059.007 JS Execution, T1567.002 Exfiltration to
Cloud Storage. SOC dashboards light up with a pre-built incident.
-
vs.
Industry response: CVE filed 6–14 days later.
By then, the package had been installed millions of times.
CyberXYZ blocked it in under 18 seconds.