You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| cmd-overwrite | Identify when the 'install' command is overwritten in setup.py, indicating a piece of code automatically running when the package is installed |
122
124
123
125
Metadata heuristics:
@@ -199,6 +201,23 @@ Source code heuristics:
199
201
| npm-steganography | Identify when a package retrieves hidden data from an image and executes it |
200
202
| npm-dll-hijacking | Identifies when a malicious package manipulates a trusted application into loading a malicious DLL |
201
203
| npm-exfiltrate-sensitive-data | Identify when a package reads and exfiltrates sensitive data from the local system |
204
+
### Extension
205
+
206
+
Source code heuristics:
207
+
208
+
|**Heuristic**|**Description**|
209
+
|:-------------:|:---------------:|
210
+
| npm-serialize-environment | Identify when a package serializes 'process.env' to exfiltrate environment variables |
211
+
| npm-obfuscation | Identify when a package uses a common obfuscation method often used by malware |
212
+
| npm-silent-process-execution | Identify when a package silently executes an executable |
213
+
| shady-links | Identify when a package contains an URL to a domain with a suspicious extension |
214
+
| npm-exec-base64 | Identify when a package dynamically executes code through 'eval' |
215
+
| npm-install-script | Identify when a package has a pre or post-install script automatically running commands |
216
+
| npm-steganography | Identify when a package retrieves hidden data from an image and executes it |
217
+
| npm-dll-hijacking | Identifies when a malicious package manipulates a trusted application into loading a malicious DLL |
218
+
| npm-exfiltrate-sensitive-data | Identify when a package reads and exfiltrates sensitive data from the local system |
0 commit comments