Universal Supply Chain Audit Tool & Threat Knowledge Base Defending against registry-native worms, malicious packages, and CI/CD compromises.
The evolution of software supply chain attacks has reached a critical point. Incidents like the Shai-Hulud 2.0 npm worm or the TeamPCP CI/CD compromise demonstrate the rise of self-propagating malware that leverages the trust of package registries to exfiltrate sensitive data.
worms-ctrl is an automated auditing tool and comprehensive Knowledge Base designed to:
- Act as an Incident Response Tool: Providing immediate audit capabilities and remediation steps when under attack.
- Serve as a Threat Database: Documenting historical threats (like Shai-Hulud) with exact Indicators of Compromise (IoCs).
- Be AI-Agent Ready: Exposing machine-readable Threat Models (JSON/YAML) that Autonomous Security Agents can consume to update defense mechanisms in real-time.
# Install the universal scanner globally
npm install -g @worms-ctrl/cli
# Run an audit against your current project using all known threat definitions
npx worms-ctrl scan
# View the Knowledge Base of tracked threats
npx worms-ctrl threatsworms-ctrl treats threats as structured data. Inside packages/ioc/, you will find JSON representations of known supply chain attacks.
When a new threat is detected via our intelligence feeds (e.g., Socket.dev, OSV, Phylum), an AI Agent can automatically generate a Threat Profile:
{
"id": "shai-hulud-2.0",
"name": "Shai-Hulud 2.0",
"ecosystem": "npm",
"severity": "CRITICAL",
"status": "ARCHIVED",
"description": "A destructive npm supply-chain worm targeting developers and CI/CD pipelines."
}- Refactor core architecture from static scripts to dynamic JSON Threat Object ingestion.
- Archive Shai-Hulud 2.0 as the first documented threat.
- Integrate real-time webhook ingestion from Socket.dev & Phylum APIs.
- Launch the
wormsCTRLpublic Knowledge Base web portal. - Implement AI Agent workflow for automatic Threat Object generation from Twitter/Mastodon threat intel.
We welcome contributions from security researchers! If you've analyzed a new malicious package campaign, please submit a PR adding a new Threat Object to our packages/ioc directory.
See CONTRIBUTING.md for details.
Formerly known as dont-be-shy-hulud.
