check_npm_package_on_dev_machines
Check all enrolled developer machines for installed versions of a malicious npm package to assess exposure on independent laptops, complementing CI checks. Optionally filter by compromised versions.
Instructions
Developer-machine 'Am I Affected?' check for an npm package. Searches across all enrolled developer laptops (Dev Machine Guard) for installs of the package. Complements check_npm_package_exposure — CI and dev machines are INDEPENDENT exposure surfaces, so when investigating a malicious-package incident you MUST check both. Uses the StepSecurity customer/tenant identifier (optional — falls back to STEP_SECURITY_CUSTOMER env var). The server's version filter is not applied — pass versions to filter results client-side to specific compromised versions, otherwise all installs are returned.
Input Schema
| Name | Required | Description | Default |
|---|---|---|---|
| customer | No | StepSecurity customer identifier. Optional — falls back to STEP_SECURITY_CUSTOMER env var. | |
| packageName | Yes | npm package name | |
| versions | No | Specific versions to match (exact string compare). Omit to return all installs. |