Project ideas from Hacker News discussions.

Axios compromised on NPM – Malicious versions drop remote access trojan

📝 Discussion Summary (Click to expand)

1. Supply‑chain attacks are now routine

"Supply chain woes continue" – mtud

2. npm’s trust model is fragile; safeguards such as minimum‑release‑age and ignore‑scripts are essential

"PSA: npm/bun/pnpm/uv now all support setting a minimum release age for packages." – postalcoder

3. Many developers are abandoning or sandboxing npm (pnpm, bun, cargo) and demand post‑install approvals > "PNPM makes you approve postinstall scripts instead of running them by default, which helps a lot." – arcfour

4. npm’s massive ecosystem makes the problem uniquely severe compared to other languages

"I refuse to download Node or use anything NPM. Thankfully other languages are better anyways." – slopinthebag

5. Version‑pinning and cool‑down periods can give a degree of “herd immunity” against rapid malicious releases

"…tell dependabot to delay a week, you’d sleep easy from this nonsense." – neko_ranger

6. Reducing dependency churn by using native standard‑library features (e.g., fetch) is seen as the only sane long‑term fix

"Well, this particular case could be wholly avoided if it didn’t take 2 decades to get competent HTTP(S) client into core language." – punchyhamster


🚀 Project Ideas

[SecureNPM]

Summary

  • A drop‑in npm replacement that enforces a minimum release‑age and disables postinstall scripts by default, sandboxing each install to stop supply‑chain RAT drops like the recent axios incident.
  • Core value proposition: Guarantees “clean” dependencies out of the box, reducing the attack surface without manual configuration.

Details

Key Value
Target Audience Node.js developers and enterprises using npm
Core Feature Enforced minimum release age, postinstall script blocking, sandboxed installations
Tech Stack Node.js, TypeScript, bubblewrap sandbox, TUF attestation, SQLite lockfile
Difficulty Medium
Monetization Revenue-ready: SaaS subscription (team tier $15/mo per user)

Notes

  • HN users repeatedly asked for “no postinstall scripts by default” – this solves that.
  • Provides a clear migration path from npm, preserving existing lockfiles.

[Coolaudit]

Summary

  • A lightweight CLI that scans local node_modules and CI dependency graphs for newly published or unsigned packages, flagging them before they can be installed.
  • Core value proposition: Early detection of compromised releases, giving teams a chance to block malicious installs.

Details

Key Value
Target Audience CI/CD engineers, open‑source maintainers
Core Feature Provenance verification, signature checking, real‑time alerting
Tech Stack Python, cryptography, TUF, npm API integration
Difficulty Low
Monetization Hobby

Notes

  • Directly answers “how to catch attacks like the axios breach” discussions.
  • Can be integrated as a pre‑commit hook or CI step for zero‑cost security. ## [TrustedRegistry]

Summary

  • A hosted package registry that requires cryptographic attestation and a minimum release‑age before a package can be published, automatically revoking compromised versions.
  • Core value proposition: Turns trusted publishing into a mandatory gate, preventing unauthorized package uploads.

Details

Key Value
Target Audience Organizations that build and distribute JavaScript/Node libraries
Core Feature Signed releases, minimum‑age enforcement, automatic revocation on compromise
Tech Stack Go, PostgreSQL, TUF, CI pipeline for attestation
Difficulty High
Monetization Revenue-ready: tiered SaaS pricing (Starter $0, Professional $99/mo)

Notes

  • Mirrors the “npm should provide trusted publishing” calls from the thread.
  • Would be a drop‑in alternative to npmjs.org for security‑first teams.

[ZeroInstall CI Guard]

Summary

  • A GitHub Action that enforces ignore‑scripts and minimum‑release‑age for every dependency install, runs installations inside a disposable Docker sandbox, and aborts the build on policy violations.
  • Core value proposition: Provides “zero‑trust” CI pipelines that block supply‑chain attacks before they reach production.

Details

Key Value
Target Audience DevOps teams using GitHub Actions for CI/CD
Core Feature Automatic script blocking, minimum‑age gate, sandboxed installs, failure on violation
Tech
Monetization Hobby

Read Later