@noble/secp256k1 @2.2.2
rejected
This version was rejected.
It did not pass GreenFlagged's security review and is not served by the registry.
The findings and risk dispositions below explain why.
25
Risk Score
MIT
License
No
Install Scripts
0
Dependencies
6
Dev Dependencies
25.8 KB
Package Size
Published
Fastest 5KB JS implementation of secp256k1 ECDH & ECDSA signatures compliant with RFC6979
Maintainers
paulmillr
Keywords
secp256k1rfc6979signatureecdsanoblecryptographyelliptic curveecccurveschnorrbitcoinethereum
Dev Dependencies (6)
| Package | Constraint | Registry Status |
|---|---|---|
| fast-check | 3.0.0 | auto_approved |
| typescript | 5.5.2 | auto_approved |
| micro-bmark | 0.3.1 | Not imported |
| micro-should | 0.4.0 | Not imported |
| @noble/hashes | 1.6.1 | auto_approved |
| @paulmillr/jsbt | 0.2.1 | Not imported |
Changes from v2.1.0
No metadata changes detected.
File Changes
0 added
0 removed
5 modified
size delta: +5.5 KB
Risk Dispositions (1 applicable to this version, 0 other)
Accepted rules are downgraded to INFO on future analyses; rejected rules escalate to CRITICAL.
| Rule | Source | Disposition | Author | Reason | |
|---|---|---|---|---|---|
regressed-provenance |
provenance | reject | AI | AI (provenance): Cryptographic primitive losing provenance attestation is a critical supply-chain risk; this pattern should fail every version of this package until attestation is restored. |
SAST Findings (1)
HIGH
Provenance attestation missing — previous versions had it
provenance
This version was published without provenance, but prior versions were published via CI/CD with attestations. This is a strong signal of a potential account compromise or unauthorized publish. The axios attack (March 2026) exhibited exactly this pattern.
Review Summary
Risk score: 25. Findings: 1 high (+25).
Commit: 22fe33f064df Browse source
Published to npm: