Analyze your own packages withvet GitHub

picomatch@4.0.3

Safe
Analyzed at:7/15/2025, 7:41:51 PM
Source:https://registry.npmjs.org/picomatch/-/picomatch-4.0.3.tgz
SHA256:ad6211fd159de67764a3bdce517497688eddf5da1fd1d68f3115f2013c108a9c
Confidence:Medium
Summary

This analysis was performed using vet and SafeDep Cloud Malicious Package Analysis. Integrate with GitHub using vet-action GitHub Action.

YARA rule python_exec_complex matched a JavaScript file, likely a false positive. Insufficient evidence to classify as malware.

Details

The YARA rule python_exec_complex matched a JavaScript file (parse.js). This rule is designed to detect potentially malicious Python code execution. Applying it to a JavaScript file is likely a false positive. While the matched string $exec is present in the code, its context exec(remaining()) within a JavaScript file does not indicate malicious intent without further evidence. Therefore, based on this single YARA rule match on a non-Python file, the package is not classified as malware.