
Security News
Attackers Are Hunting High-Impact Node.js Maintainers in a Coordinated Social Engineering Campaign
Multiple high-impact npm maintainers confirm they have been targeted in the same social engineering campaign that compromised Axios.
replicas-engine
Advanced tools
Replicas Engine is the workspace runtime that powers coding agents.
Authorization Header: X-Replicas-Engine-Secret: <REPLICAS_ENGINE_SECRET>
Core Flow:
/status, /chats, /repos, /hooks/status).GET /events for deltas.POST /chats/:chatId/messages.System:
GET /healthGET /statusGET /token-refresh/healthStream:
GET /events (SSE)Chats:
POST /chatsGET /chatsGET /chats/:chatIdDELETE /chats/:chatIdGET /chats/:chatId/historyPOST /chats/:chatId/messagesPOST /chats/:chatId/interruptPlans:
GET /plansGET /plans/:filenameRepos and hooks:
GET /reposGET /repos?includeDiffs=true (includes gitDiff.fullDiff)GET /hooks/statusSSE envelope:
id: stable event idevent: engine event typedata: JSON-serialized EngineEventThe engine is expected to run in a VM/sandbox with:
/home/ubuntu)~/workspacesgh CLI available in PATH (for PR URL discovery)From monolith/src/lib/daytona.ts + monolith/src/lib/workspaces.ts, the VM is expected to be prepped with:
git config --global user.name <bot-or-user-name>git config --global user.email <bot-or-user-email>git config --global credential.helper store~/.git-credentials with https://x-access-token:<token>@github.com/home/ubuntu/workspaces/<repo-name>/home/ubuntu/workspaces/<repo-name>~/.claude/.credentials.json~/.claude/.bedrock-credentials.jsonCLAUDE_CODE_USE_BEDROCK=1, AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY, AWS_REGION~/.codex/auth.jsontokens.id_token, tokens.access_token, tokens.refresh_token, tokens.account_idToken refresh managers may later overwrite credential files in place:
~/.git-credentials~/.claude/.credentials.json~/.codex/auth.jsonEngine persistence locations:
~/.replicas/engine/chats.json~/.replicas/engine/events.jsonl~/.replicas/engine-state.json~/.replicas/startHooks.log/plans endpoints):
~/.claude/plans~/.replicas/plans/var/log/cloud-init-output.log (if missing, /health reports initializing)src/engine-env.ts is the source of truth for engine runtime environment variables.
Use that file to understand:
Engine env vars are injected by monolith when the engine is started inside sandboxes.
Credential files expected/used by provider CLIs:
~/.git-credentials (git/gh auth)~/.claude/.credentials.json (Claude OAuth auth)~/.claude/.bedrock-credentials.json (Claude Bedrock config)~/.codex/auth.json (Codex auth)The engine calls monolith with:
Authorization: Bearer <REPLICAS_ENGINE_SECRET>X-Workspace-Id: <WORKSPACE_ID>Outgoing endpoints:
POST /v1/engine/webhookPOST /v1/engine/github/refresh-tokenPOST /v1/engine/claude/refresh-credentialsPOST /v1/engine/codex/refresh-credentialsFAQs
Lightweight API server for Replicas workspaces
We found that replicas-engine demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Multiple high-impact npm maintainers confirm they have been targeted in the same social engineering campaign that compromised Axios.

Security News
Axios compromise traced to social engineering, showing how attacks on maintainers can bypass controls and expose the broader software supply chain.

Security News
Node.js has paused its bug bounty program after funding ended, removing payouts for vulnerability reports but keeping its security process unchanged.