Analyze your own packages withvet GitHub

tensorflowjs@0.7.0

Malicious
Verified
Analyzed at:8/12/2025, 6:09:46 AM
Source:https://registry.npmjs.org/tensorflowjs/-/tensorflowjs-0.7.0.tgz
SHA256:8f1e4a377215e0718596765dcacb2ba01460caecd7f842bd51423f3d5d193497
Confidence:High
Summary

This analysis was performed using vet and SafeDep Cloud Malicious Package Analysis. Integrate with GitHub using vet-action GitHub Action.

Note: This report is updated by a verification record

Package is likely malicious due to code obfuscation, arbitrary command execution via child_process.spawn, and suspicious postinstall script.

Verification Record

Malicious package targeting TensorFlow users through typosquatting. Contains code designed to steal credentials and compromise developer systems.

Malicious NPM package masquerading as the legitimate TensorFlow.js library. Uses typosquatting to target developers installing TensorFlow dependencies. Contains malicious code designed to compromise development environments.

Details

Note: This report is updated by a verification record

The package tensorflowjs version 0.7.0 is highly likely to be malicious due to several factors. The index.js and thanksinstall.js files contain obfuscated code, as indicated by the YARA rules js_char_code_at_substitution and js_hex_obfuscation. Furthermore, the LLM-based file evaluation service identifies thanksinstall.js as using obfuscation and executing arbitrary commands using child_process.spawn. The package.json file contains a postinstall script that executes node thanksinstall.js, which is a common technique used by malware to run malicious code after installation. These combined factors strongly suggest malicious intent.

YARA Analyzer
Medium