扫描报告
20 /100
defender2
Scan npm packages or projects to detect JavaScript malware and Windows filename RLO malware, supply chain attacks, and malicious packages
Legitimate npm malware detector with a structural concern (executable code embedded in SKILL.md) but no confirmed malicious behavior or exfiltration capabilities.
可以安装
Remove the embedded Python code from SKILL.md and keep documentation separate from implementation. The hardcoded IP is acceptable as a detection pattern database for a security tool.
安全发现 3 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 中危 | Executable code embedded in SKILL.md | SKILL.md:46 |
| 低危 | Hardcoded IP in IOC detection database | scripts/pua.py:60 |
| 提示 | eval(atob()) pattern detection is defensive | scripts/pua.py:76 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | NONE | READ | ✓ 一致 | Tool legitimately reads files to scan for malware patterns |
| 网络访问 | NONE | NONE | — | No network connections observed - only local file scanning |
| 命令执行 | NONE | NONE | — | No subprocess or shell execution in implementation |
| 环境变量 | NONE | NONE | — | No environment variable access observed |
1 严重 1 高危 2 项发现
严重 编码执行 Base64 编码执行(代码混淆)
eval(atob( SKILL.md:46 高危 IP 地址 硬编码 IP 地址
140.82.54.223 scripts/pua.py:94 目录结构
2 文件 · 14.1 KB · 396 行 Python 1f · 346L
Markdown 1f · 50L
├─
▾
scripts
│ └─
pua.py
Python
└─
SKILL.md
Markdown
依赖分析 1 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
None (stdlib only) | N/A | built-in | 否 | No external dependencies - uses only Python standard library (base64, re, os, sys, json, pathlib, typing) |
安全亮点
✓ Uses only Python standard library - no external dependencies to compromise
✓ Purely defensive tool - reads files locally to detect malware patterns
✓ No network exfiltration or C2 communication observed
✓ No credential harvesting or sensitive path access
✓ No subprocess/shell execution capabilities
✓ Includes comprehensive malware pattern detection (PUA, eval patterns, persistence techniques)
✓ No evidence of data theft or reverse shell mechanisms