Skip to content

Aikido Safe Chain prevents developers from installing malicious code via npm, yarn, pnpm, npx, and pnpx. Free to use, no tokens required.

License

Notifications You must be signed in to change notification settings

AikidoSec/safe-chain

Repository files navigation

Aikido Safe Chain

The Aikido Safe Chain prevents developers from installing malware on their workstations through npm, npx, yarn, pnpm and pnpx. It's free to use and does not require any token.

The Aikido Safe Chain wraps around the npm cli, npx, yarn, pnpm, and pnpx to provide extra checks before installing new packages. This tool will detect when a package contains malware and prompt you to exit, preventing npm, npx, yarn, pnpm or pnpx from downloading or running the malware.

demo

Aikido Safe Chain works on Node.js version 18 and above and supports the following package managers:

  • ✅ full coverage: npm >= 10.4.0:
  • ⚠️ limited to scanning the install command arguments (broader scanning coming soon):
    • npm < 10.4.0
    • npx
    • yarn
    • pnpm
    • pnpx
  • 🚧 bun: coming soon

Note on the limited support for npm < 10.4.0, npx, yarn, pnpm and pnpx: adding full support for these package managers is a high priority. In the meantime, we offer limited support already, which means that the Aikido Safe Chain will scan the package names passed as arguments to the install commands. However, it will not scan the full dependency tree of these packages.

Usage

Installation

Installing the Aikido Safe Chain is easy. You just need 3 simple steps:

  1. Install the Aikido Safe Chain package globally using npm:
    npm install -g @aikidosec/safe-chain
  2. Setup the shell integration by running:
    safe-chain setup
  3. ❗Restart your terminal to start using the Aikido Safe Chain.
    • This step is crucial as it ensures that the shell aliases for npm, npx, yarn, pnpm and pnpx are loaded correctly. If you do not restart your terminal, the aliases will not be available.
  4. Verify the installation by running:
    npm install safe-chain-test
    • The output should show that Aikido Safe Chain is blocking the installation of this package as it is flagged as malware.

When running npm, npx, yarn, pnpm or pnpx commands, the Aikido Safe Chain will automatically check for malware in the packages you are trying to install. If any malware is detected, it will prompt you to exit the command.

How it works

The Aikido Safe Chain works by intercepting the npm, npx, yarn, pnpm and pnpx commands and verifying the packages against Aikido Intel - Open Sources Threat Intelligence.

The Aikido Safe Chain integrates with your shell to provide a seamless experience when using npm, npx, yarn, pnpm and pnpx commands. It sets up aliases for these commands so that they are wrapped by the Aikido Safe Chain commands, which perform malware checks before executing the original commands. We currently support:

  • Bash
  • Zsh
  • Fish
  • PowerShell
  • PowerShell Core

More information about the shell integration can be found in the shell integration documentation.

Uninstallation

To uninstall the Aikido Safe Chain, you can run the following command:

  1. Remove all aliases from your shell by running:
    safe-chain teardown
  2. Uninstall the Aikido Safe Chain package using npm:
    npm uninstall -g @aikidosec/safe-chain
  3. ❗Restart your terminal to remove the aliases.

Configuration

Malware Action

You can control how Aikido Safe Chain responds when malware is detected using the --safe-chain-malware-action flag:

  • --safe-chain-malware-action=block (default) - Automatically blocks installation and exits with an error when malware is detected
  • --safe-chain-malware-action=prompt - Prompts the user to decide whether to continue despite the malware detection

Example usage:

npm install suspicious-package --safe-chain-malware-action=prompt

Usage in CI/CD

You can protect your CI/CD pipelines from malicious packages by integrating Aikido Safe Chain into your build process. This ensures that any packages installed during your automated builds are checked for malware before installation.

For optimal protection in CI/CD environments, we recommend using npm >= 10.4.0 as it provides full dependency tree scanning. Other package managers currently offer limited scanning of install command arguments only.

Setup

To use Aikido Safe Chain in CI/CD environments, run the following command after installing the package:

safe-chain setup-ci

This automatically configures your CI environment to use Aikido Safe Chain for all package manager commands.

Supported Platforms

  • GitHub Actions
  • Azure Pipelines

GitHub Actions Example

- name: Setup Node.js
  uses: actions/setup-node@v4
  with:
    node-version: "22"
    cache: "npm"

- name: Setup safe-chain
  run: |
    npm i -g @aikidosec/safe-chain
    safe-chain setup-ci

- name: Install dependencies
  run: |
    npm ci

Azure DevOps Example

- task: NodeTool@0
  inputs:
    versionSpec: "22.x"
  displayName: "Install Node.js"

- script: |
    npm i -g @aikidosec/safe-chain
    safe-chain setup-ci
  displayName: "Install safe chain"

- script: |
    npm ci
  displayName: "npm install and build"

After setup, all subsequent package manager commands in your CI pipeline will automatically be protected by Aikido Safe Chain's malware detection.

About

Aikido Safe Chain prevents developers from installing malicious code via npm, yarn, pnpm, npx, and pnpx. Free to use, no tokens required.

Resources

License

Contributing

Stars

Watchers

Forks

Languages