
Security News
The Hidden Blast Radius of the Axios Compromise
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.
@appthreat/caxa
Advanced tools
Package Node.js applications into executable binaries.
This is a high-performance fork of caxa (v3.0.1) maintained by AppThreat. Version 2.0 introduces significant architectural changes focused on build speed, runtime performance, and supply chain security.
--upx flag is used, caxa now compresses the bundled Node.js executable before archiving it. This, combined with the compressed stub, results in significantly smaller final binaries (often reducing size by 30-50MB compared to standard builds).klauspost/compress/gzip). This significantly reduces the "Time to First Hello World" compared to standard implementations.node_modules) concurrently, maximizing disk I/O saturation. Large files (>1MB) are streamed synchronously to prevent memory spikes.binary-metadata.json sidecar file containing a full dependency graph (components and relationship tree). This facilitates high-fidelity SBOM generation using tools like cdxgen.caxa does not compile Node.js from source or mess with V8 internals. It works by creating a self-extracting executable with a specific structure.
Whether you use UPX or not, the final binary structure follows this layout:
+-----------------------------+
| Go Stub | <-- The executable entry point.
| (Native Code / UPX Packed) | Responsible for bootstrapping.
+-----------------------------+
| \nCAXACAXACAXA\n | <-- Magic Separator (Plaintext).
+-----------------------------+
| Application Payload | <-- Your project files + Node.js binary.
| (tar + gzip) | Streamed directly to disk at runtime.
+-----------------------------+
| JSON Config | <-- Metadata, Command arguments, & Build ID.
+-----------------------------+
--upx is used, this section is compressed.--upx is enabled, the internal Node.js executable is also UPX-compressed, drastically reducing the payload size.When executed, the Stub reads its own file content, scans for the Magic Separator to find the Payload, extracts it to a temporary directory (if not already cached), and executes the Node.js process with the arguments defined in the Footer.
.node files).require(). Filesystem access works exactly as it does in a standard Node.js environment.$ npm install --save-dev @appthreat/caxa
Ensure your project is built (e.g., TypeScript compiled to JavaScript) and dependencies are installed.
npm ci
npm run build
Call caxa from the command line:
$ npx caxa --input "." --output "my-app" -- "{{caxa}}/node_modules/.bin/node" "{{caxa}}/dist/index.js"
To create a smaller binary, use the --upx flag. You must have upx installed on your system.
$ npx caxa --input "." --output "my-app" --upx --upx-args="--best" -- "{{caxa}}/node_modules/.bin/node" "{{caxa}}/dist/index.js"
pnpm is also supported. Below is how cdxgen SEA binaries gets created.
$ pnpm --package=@appthreat/caxa dlx caxa --input . --output cdxgen -- "{{caxa}}/node_modules/.bin/node" "{{caxa}}/bin/cdxgen.js"
Usage: caxa [options] <command...>
Arguments:
command The command to run. Paths must be absolute.
The '{{caxa}}' placeholder is substituted for the extraction directory.
The 'node' executable is available at '{{caxa}}/node_modules/.bin/node'.
Options:
-i, --input <input> [Required] The input directory to package.
-o, --output <output> [Required] The path where the executable will be produced.
On Windows, must end in '.exe'.
-F, --no-force Don't overwrite output if it exists.
-e, --exclude <path...> Paths to exclude from the build (glob patterns).
-N, --no-include-node Don't copy the Node.js executable into the package.
-s, --stub <path> Path to a custom stub.
--identifier <identifier> Build identifier used for the extraction path.
-B, --no-remove-build-directory [Legacy] Ignored in v2 due to streaming build architecture.
-m, --uncompression-message <message> A message to show to the user while uncompressing.
--upx Compress the output binary (and included Node.js) with UPX.
--upx-args <args...> Arguments to pass to UPX (e.g., '--best --lzma').
-V, --version output the version number
-h, --help display help for command
You can invoke caxa directly from TypeScript or JavaScript build scripts.
import caxa from "@appthreat/caxa";
(async () => {
await caxa({
input: ".",
output: "bin/my-app",
command: [
"{{caxa}}/node_modules/.bin/node",
"{{caxa}}/dist/index.js",
"--custom-flag",
],
exclude: ["*.log", "tmp/**"],
upx: true,
upxArgs: ["--best"],
});
})();
By default, the application extracts to the system temporary directory (os.tmpdir() joined with caxa).
To override this location (e.g., for containerized environments with read-only /tmp), set the environment variable CAXA_TEMP_DIR:
export CAXA_TEMP_DIR=/var/opt/my-app
./my-app
Every build produces a binary-metadata.json file alongside the executable. This file captures the full dependency graph of the packaged application, structured to align with SBOM standards.
Example binary-metadata.json:
{
"components": [
{
"group": "",
"name": "my-app",
"version": "1.0.0",
"purl": "pkg:npm/my-app@1.0.0"
},
{
"group": "",
"name": "commander",
"version": "12.0.0",
"purl": "pkg:npm/commander@12.0.0"
}
],
"dependencies": [
{
"ref": "pkg:npm/my-app@1.0.0",
"dependsOn": ["pkg:npm/commander@12.0.0"]
}
]
}
caxa must have the same architecture/OS as the target if you want to bundle the correct Node.js binary. You cannot bundle a Windows Node.js executable from a macOS machine (unless you provide it manually via custom scripts).FAQs
Package Node.js applications into executable binaries
We found that @appthreat/caxa demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.

Research
A supply chain attack on Axios introduced a malicious dependency, plain-crypto-js@4.2.1, published minutes earlier and absent from the project’s GitHub releases.

Research
Malicious versions of the Telnyx Python SDK on PyPI delivered credential-stealing malware via a multi-stage supply chain attack.