Et Tu, Agent? Did You Install the Backdoor?

https://a16z.com/et-tu-agent-did-you-install-the-backdoor/
  • AI coding agents install malicious dependencies faster than humans can review.
    • Agents pick known-vulnerable package versions 50% more than humans do.
    • Security review window compressed to near-zero in autonomous pipelines.
  • Slopsquatting: attackers register hallucinated package names LLMs keep suggesting.
    • One dummy package hit 30,000 downloads in weeks with zero marketing.
  • Average app has 1,100+ OSS components; basic Next.js pulls 282 before your code.
    • 755 transitive deps in median GitHub JS project — chosen by nobody on the team.
  • Axios attack: hijacked maintainer account, malicious dep, self-deleting RAT.
    • 100M+ weekly downloads; malware phoned home in 89 seconds, then erased itself.
  • TeamPCP worm: one stolen token hit GitHub, Docker Hub, npm, PyPI, VS Code in 8 days.
    • Spread via blockchain C2 across 66+ npm packages.
  • Industry detection avg: 267 days; behavioral scanners (Socket) caught Axios in 6 minutes.
    • CVE databases miss planted backdoors — no CVE entry for novel malware.
  • Fix: move controls to dependency entry point, analyze behavior not CVE lists.

Joel de la Garza, Malika Aubakirova, and Zane Lackey (a16z) · 2026-04-02 · Read on a16z.com


Type Link
Added Apr 2, 2026
Modified Apr 15, 2026