Analyze your own packages withvet GitHub

napi-postinstall@0.3.1

Malicious
Verified
Analyzed at:7/18/2025, 5:32:09 PM
Source:https://registry.npmjs.org/napi-postinstall/-/napi-postinstall-0.3.1.tgz
SHA256:77df7df22a772487e121d2a4fd41ca9f709be4d2e3e27efeb4ffb39e5380357e
Confidence:High
Summary

This analysis was performed using vet and SafeDep Cloud Malicious Package Analysis. Integrate with GitHub using vet-action GitHub Action.

Note: This report is updated by a verification record

Malicious package due to embedded executable, arbitrary code execution during install, command injection vulnerabilities, and untrustworthy source project.

Verification Record

Package compromised via npm token leak from phishing attack

Package compromised via phishing attack that led to npm token leak. Malicious versions released by attacker. Package maintainer has deprecated affected versions and released clean versions.

Details

Note: This report is updated by a verification record

The package exhibits several suspicious behaviors indicative of malicious intent. Firstly, it contains an embedded executable (node-gyp.dll) with a mismatched extension, suggesting potential obfuscation. Secondly, the install.js script executed during installation allows arbitrary code execution. Finally, the package uses npm install and yarn add in a way that is vulnerable to command injection, where attacker-controlled package names or versions can lead to remote code execution. The low popularity of the source project further increases the risk.