Gate News message. On March 31, the SlowMist security team issued an alert. As of March 31, 2026, public intelligence shows that axios@1.14.1 and axios@0.30.4 have both been confirmed as malicious versions. Both have been implanted with an additional dependency, plain-crypto-js@4.2.1. This dependency can deliver cross-platform malicious payloads via a postinstall script.
The impact of this incident on OpenClaw needs to be judged by scenario: 1) In the source build scenario, there is no impact. In v2026.3.28, the lock file actually locks axios@1.13.5 / 1.13.6, which does not match the malicious versions; 2) In the scenario of running npm install -g openclaw@2026.3.28, there is a risk of historical exposure. The reason is that the dependency chain includes openclaw -> @line/bot-sdk@10.6.0 -> optionalDependencies.axios@^1.7.4. Within the time window when the malicious versions are still online, it may resolve to axios@1.14.1; 3) The current reinstallation results show that npm has rolled back resolution to axios@1.14.0. However, for environments where installation occurred within the attack window, it is still recommended to treat it as an affected scenario and investigate IoC.
SlowMist advises that if a plain-crypto-js directory is found, even if its package.json has been cleaned up, it should be treated as a high-risk execution artifact. For hosts that ran npm install or npm install -g openclaw@2026.3.28 within the attack window, it is recommended to immediately rotate credentials and conduct host-side investigation.
Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to
Disclaimer.
Related Articles
Rhea Finance Suffers a $18.4 Million Loss After an Oracle Attack: ZachXBT Warns, Tether Freezes 4.34 Million USDT, and the Attacker Returns Some Funds
Rhea Finance suffered an oracle manipulation attack on the NEAR Protocol, with losses reaching $18.4 million—double the initial estimate. The attacker manipulated the pricing of a fake token, causing collateral valuations to be incorrect. Tether froze about $4.34 million in USDT; the attacker returned roughly $3.5 million. To date, more than $7.8 million has been recovered, highlighting the importance of oracle security.
ChainNewsAbmedia7h ago
eth.limo DNS Under Attack, Vitalik Urges Users to Pause Access and Switch to IPFS
Vitalik Buterin warned on April 18 about an attack on the DNS registrar for eth.limo, urging users to avoid accessing vitalik.eth.limo and related pages. He recommended using IPFS as an alternative until the issue is resolved.
GateNews7h ago
Sanctioned Exchange Grinex Hit by $13.7M Hack; Blames Foreign Intelligence Services
Grinex, a sanctioned crypto-ruble exchange, has halted operations due to a cyberattack that stole over $13.74 million in USDT. The attack is believed to involve state-level actors aiming to destabilize Russia's financial system. Grinex is cooperating with law enforcement but has no timeline for resuming services.
Coinpedia15h ago
Figure Faces Short Seller Accusations Over Blockchain Integration Claims; FIGR Stock Down 53% From January Peak
Figure Technology Solutions faced allegations from Morpheus Research of overstating its blockchain technology use, resulting in a significant drop in share prices. Figure defended its operations, highlighting its digital asset features and strong performance metrics.
GateNews22h ago
Houston Crypto Fraudster Sentenced to 23 Years for $20M Meta-1 Coin Scam
Robert Dunlap, a Houston entrepreneur, was sentenced to 23 years in prison for a $20 million cryptocurrency fraud involving fake assets and deceptive practices, impacting over 1,000 victims. His case reflects a broader rise in crypto-related cybercrimes.
GateNews04-17 12:11
SlowMist Warns of Active Phishing Attack Using Fake 'Harmony Voice' Software
SlowMist's security team has warned of a social engineering campaign targeting cryptocurrency users. Fraudsters are posing as project partners to trick users into downloading a malicious application disguised as a translation tool. Users are advised to verify software authenticity.
GateNews04-17 11:46