#005Critical⚡ Novel Vector2026-04-03

RAT Disguised as AI Coding Tool

keystonewm@1.0.0 + tsunami-code@3.11.4

First RAT Disguised as AI Coding Agent
Verdict:MALICIOUS — Functional RAT with polished terminal UI

Overview

Two packages by the same attacker (maximpereira) pose as AI coding agent CLIs with polished terminal UIs but route all user interactions through an attacker-controlled ngrok tunnel. They are functional RATs disguised as AI coding tools, exploiting the trust model where users willingly give these tools access to their entire codebase.

2
Related Packages
38
tsunami-code Versions
ngrok
C2 Channel
ripgrep
Legitimate Cover

Attack Flow

Legitimate Cover
Postinstall runs node scripts/setup.js which downloads a legitimate ripgrep binary as cover for the setup process.
C2 Connection
Hardcoded C2 at radiometric-reita-amuck.ngrok-free.dev receives all user prompts and code context.
Full Control
Attacker controls both prompts and responses, enabling arbitrary tool-call instructions. Users unknowingly give full filesystem and code access.

MITRE ATT&CK Mapping

T1219Remote Access Software — ngrok tunnel RAT
T1071.001Web Protocols — C2 via HTTPS/ngrok
T1036.005Masquerading — disguised as AI coding tool
T1195.002Supply Chain Compromise — npm distribution

Tags

RATngrokAI Coding ToolSocial EngineeringC2

Full Report

Fake AI Coding Agents: keystonewm + tsunami-code (ngrok RAT)

TL;DR

Two npm packages by the same attacker pose as AI coding agent CLIs but route all user interactions through an attacker-controlled ngrok tunnel. They are functional RATs disguised with polished terminal UIs.

Packages

PackageVersionsMaintainer
keystonewm@1.0.01maximpereira (maximpereiraceo@gmail.com)
tsunami-code@3.11.438maximpereira (maximpereiraceo@gmail.com)

Same attacker, same C2, same postinstall pattern (node scripts/setup.js).

Attack (verified from source code)

The C2 Connection

const DEFAULT_SERVER = 'https://radiometric-reita-amuck.ngrok-free.dev';

All user prompts, code context, and tool calls route through this ngrok free-tier tunnel. The attacker sees everything the user types and can return arbitrary tool-call instructions.

The Disguise

The packages ship with polished CLI features: chalk colors, readline interface, a "Keystone CLI" banner, configurable model server. It looks like a legitimate AI coding tool. But the "model server" is the attacker's ngrok endpoint.

The Setup Script

// setup.js — postinstall
// Downloads ripgrep binary from GitHub (legitimate)
const RG_VERSION = '14.1.1';

The postinstall downloads a real ripgrep binary from BurntSushi/ripgrep GitHub releases — this makes the install look normal. The malicious part is the hardcoded C2 in the main code.

What Makes This Novel

AI coding agent as RAT UI — the attacker built a functional coding assistant interface but pointed it at their own server. The user thinks they're talking to an AI model, but the attacker controls both the prompts and responses. This exploits the new trust model around AI coding tools — users willingly give these tools access to their entire codebase.

IOCs

  • radiometric-reita-amuck.ngrok-free.dev — C2 tunnel
  • ~/.keystonewm/config.json — local config
  • Maintainer: maximpereiraceo@gmail.com (both packages)

Credits

Detected by: npm-sentinel automated scanner Date: 2026-04-03