Self-hosted, PCI-DSS compliant npm supply chain threat detection for VeryPay infrastructure
axios HTTP client —
v1.14.1 and v0.30.4 — to npm. These packages contained a
Remote Access Trojan (RAT) that established reverse shells, exfiltrated environment variables
(API keys, database credentials), and persisted via OS-level mechanisms.
curl -sSL https://scan.dev.verypay.io/scan.sh | bash
curl -sSL https://scan.dev.verypay.io/scan.sh | bash -s -- --server
irm https://scan.dev.verypay.io/scan.ps1 | iex
curl -sSL https://scan.dev.verypay.io/scan.sh | bash -s -- --ci --project-dir .
| Requirement | Description | Scanner Coverage |
|---|---|---|
| 5.2 | Anti-malware mechanisms | IOC detection + YARA rules detect known RAT payloads |
| 6.3.2 | Software inventory | Lockfile audit inventories all third-party dependencies |
| 6.5.4 | Supply chain attack protection | Detects compromised packages and C2 callbacks |
| 10.2 | Audit trail for events | JSON report with timestamped check-by-check results |
| 11.4 | Intrusion detection | Exported Snort rules for network IDS deployment |
| 11.5 | File integrity monitoring | Content pattern scan detects malicious code in any path |
| 12.10 | Incident response plan | Auto-remediation steps with credential rotation checklist |
You don't need to run the scanner yourself. Follow these steps to make sure your machine is checked by the security team.
Client-side JSON viewer — no data leaves your browser