Scan Report
20 /100
defender2
Scan npm packages or projects to detect JavaScript malware and Windows filename RLO malware, supply chain attacks, and malicious packages
Legitimate npm malware detector with a structural concern (executable code embedded in SKILL.md) but no confirmed malicious behavior or exfiltration capabilities.
Safe to install
Remove the embedded Python code from SKILL.md and keep documentation separate from implementation. The hardcoded IP is acceptable as a detection pattern database for a security tool.
Findings 3 items
| Severity | Finding | Location |
|---|---|---|
| Medium | Executable code embedded in SKILL.md | SKILL.md:46 |
| Low | Hardcoded IP in IOC detection database | scripts/pua.py:60 |
| Info | eval(atob()) pattern detection is defensive | scripts/pua.py:76 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | NONE | READ | ✓ Aligned | Tool legitimately reads files to scan for malware patterns |
| Network | NONE | NONE | — | No network connections observed - only local file scanning |
| Shell | NONE | NONE | — | No subprocess or shell execution in implementation |
| Environment | NONE | NONE | — | No environment variable access observed |
1 Critical 1 High 2 findings
Critical Encoded Execution Base64 编码执行(代码混淆)
eval(atob( SKILL.md:46 High IP Address 硬编码 IP 地址
140.82.54.223 scripts/pua.py:94 File Tree
2 files · 14.1 KB · 396 lines Python 1f · 346L
Markdown 1f · 50L
├─
▾
scripts
│ └─
pua.py
Python
└─
SKILL.md
Markdown
Dependencies 1 items
| Package | Version | Source | Known Vulns | Notes |
|---|---|---|---|---|
None (stdlib only) | N/A | built-in | No | No external dependencies - uses only Python standard library (base64, re, os, sys, json, pathlib, typing) |
Security Positives
✓ Uses only Python standard library - no external dependencies to compromise
✓ Purely defensive tool - reads files locally to detect malware patterns
✓ No network exfiltration or C2 communication observed
✓ No credential harvesting or sensitive path access
✓ No subprocess/shell execution capabilities
✓ Includes comprehensive malware pattern detection (PUA, eval patterns, persistence techniques)
✓ No evidence of data theft or reverse shell mechanisms