Skip to content

FYI: coordinated automated PR campaign across HTTP client libraries — you already caught it #4943

@rsbasic

Description

@rsbasic

Summary

Your team caught and closed PR #4860 from nthbotast — the one that would have defaulted HTTPS proxy connections to plaintext HTTP. I wanted to flag that this appears to be part of a broader pattern across multiple JavaScript HTTP client libraries.

The Broader Pattern

The same account (nthbotast, created February 27, 2026, 160 PRs in 31 days) submitted source code PRs targeting proxy and credential handling on three HTTP client libraries in the same week:

On lodash/lodash (a utility library, not HTTP), the same account submitted 15 PRs — but those source code changes actually strengthen prototype pollution defenses. The security-weakening changes are specific to HTTP client libraries.

Context

  • The account has 0 followers, no bio, no company, and uses AI-assisted PR generation (references "cubic" in axios PR descriptions)
  • On each repo, the pattern is identical: docs PRs first, then escalation to source code targeting connection/auth infrastructure
  • node-fetch (131M weekly downloads) has no active maintainer to catch these — your team's review process is why undici was protected

Full Analysis

I posted the complete audit with PR-by-PR review across all four libraries here: node-fetch/node-fetch#1882

No action needed from your team — you already handled it correctly. Posting this so you have visibility into the cross-repo pattern in case the account returns with new PRs.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions