Analyze your own packages withvet GitHub

os-info-checker-es6@1.0.8

Suspicious
Analyzed at:5/7/2025, 9:05:53 PM
Source:https://registry.npmjs.org/os-info-checker-es6/-/os-info-checker-es6-1.0.8.tgz
SHA256:e12a123e42ba74e4cf8f2adf95d72036d6ea0dc33bf86f86fb1d1be7db2d419f
Confidence:Medium
Summary

This analysis was performed using vet and SafeDep Cloud Malicious Package Analysis. Integrate with GitHub using vet-action GitHub Action.

Malicious package due to suspicious preinstall script, runtime dependency resolution in .node file, and missing source project information.

Details

The package exhibits several suspicious behaviors that, when combined, strongly suggest malicious intent.

  • Evidence 0 & 1: Suspicious preinstall script: The package.json includes a preinstall script that executes node preinstall.js. This is a common technique used by malicious packages to execute arbitrary code during installation. The fact that this script exists warrants further investigation of preinstall.js's contents. The LLM-based analysis also flags this as suspicious, further increasing concern.

  • Evidence 2: Suspicious runtime dependency resolution: The YARA rule sus_dylib_tls_get_addr matched in package/src/index_linux.node indicates suspicious runtime dependency resolution. The presence of __tls_get_addr suggests the potential for dynamic loading of libraries, which can be used to hide malicious code or bypass security measures. This is particularly concerning in a .node file, which is a compiled binary.

  • Evidence 3: Missing source project information: The absence of source project information makes it difficult to assess the package's trustworthiness. While not inherently malicious, it contributes to the overall suspicion, as it could be an attempt to obscure the package's origin.

While any single one of these findings might not be conclusive, the combination of a preinstall script running arbitrary code, a suspicious .node file with runtime dependency resolution, and the lack of source project information paints a picture of a package that is likely malicious. The preinstall script is a particularly strong indicator, as it allows for immediate execution of code upon installation, making it a prime target for malicious actors.

Medium