Analyze your own packages withvet GitHub

xrpl@4.2.3

Possibly Malicious
Analyzed at:4/21/2025, 9:33:47 PM
Source:https://registry.npmjs.org/xrpl/-/xrpl-4.2.3.tgz
SHA256:ea0229e65c01013783b9fca218ac06161ace4584c04694c43683283f10d58f5d
Confidence:Medium
Summary

This analysis was performed using vet and SafeDep Cloud Malicious Package Analysis. Integrate with GitHub using vet-action GitHub Action.

Malicious HTTP POST requests to a suspicious domain (.xyz) sending user data ('seed'), coupled with missing project info, strongly indicates malware.

Details

The package xrpl version 4.2.3 exhibits strong indicators of malicious behavior. While YARA rules alone are insufficient, the consistent findings across multiple files (index.js, src/index.js, xrpl-latest-min.js, xrpl-latest.js) pointing to HTTP POST requests to https://0x9c.xyz/xc are corroborated by LLM-based analysis. Evidence 2 and 5 explicitly identify a checkValidityOfSeed function sending user data ('seed') via POST to this suspicious domain. This strongly suggests data exfiltration to a potential Command and Control (C&C) server. The unusual top-level domain (.xyz) further adds to the suspicion. The lack of project information (Evidence 8) exacerbates the risk, as it hinders verification of the package's legitimacy. The combination of multiple independent sources confirming the malicious HTTP POST requests, coupled with the missing project information, provides strong evidence for classifying this package as malware.