<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Supply-Chain on Start AI Tools - Presented by Intent Solutions</title><link>https://startaitools.com/tags/supply-chain/</link><description>Recent content in Supply-Chain on Start AI Tools - Presented by Intent Solutions</description><generator>Hugo</generator><language>en-US</language><copyright>Intent Solutions. All rights reserved.</copyright><lastBuildDate>Thu, 02 Apr 2026 22:12:54 -0500</lastBuildDate><atom:link href="https://startaitools.com/tags/supply-chain/index.xml" rel="self" type="application/rss+xml"/><item><title>Software Supply Chain Security After Axios</title><link>https://startaitools.com/posts/software-supply-chain-security/</link><pubDate>Thu, 02 Apr 2026 08:00:00 -0500</pubDate><guid>https://startaitools.com/posts/software-supply-chain-security/</guid><description>&lt;p&gt;On March 31, 2026, attackers published two malicious versions of axios — a package with roughly 100 million weekly npm downloads — during a window of a little over three hours. Google Threat Intelligence Group attributed the campaign to UNC1069, a North Korea-nexus threat actor. The malicious releases introduced a dependency that used a postinstall script to deploy a cross-platform remote access trojan.&lt;/p&gt;
&lt;p&gt;During that window, any CI/CD pipeline or developer workstation that freshly resolved the affected versions and allowed lifecycle scripts to run could have been compromised. Projects with previously committed lockfiles were far less likely to be affected.&lt;/p&gt;</description></item></channel></rss>