Analyze your own packages withvet GitHub

tensorflowjs@0.7.0

Suspicious
Analyzed at:8/12/2025, 6:09:46 AM
Source:https://registry.npmjs.org/tensorflowjs/-/tensorflowjs-0.7.0.tgz
SHA256:8f1e4a377215e0718596765dcacb2ba01460caecd7f842bd51423f3d5d193497
Confidence:Medium
Summary

This analysis was performed using vet and SafeDep Cloud Malicious Package Analysis. Integrate with GitHub using vet-action GitHub Action.

Package is likely malicious due to code obfuscation, arbitrary command execution via child_process.spawn, and suspicious postinstall script.

Details

The package tensorflowjs version 0.7.0 is highly likely to be malicious due to several factors. The index.js and thanksinstall.js files contain obfuscated code, as indicated by the YARA rules js_char_code_at_substitution and js_hex_obfuscation. Furthermore, the LLM-based file evaluation service identifies thanksinstall.js as using obfuscation and executing arbitrary commands using child_process.spawn. The package.json file contains a postinstall script that executes node thanksinstall.js, which is a common technique used by malware to run malicious code after installation. These combined factors strongly suggest malicious intent.