Analyze your own packages withvet GitHub

@peculiar/x509@1.14.0

Suspicious
Analyzed at:9/8/2025, 6:41:36 PM
Source:https://registry.npmjs.org/@peculiar/x509/-/x509-1.14.0.tgz
SHA256:7ad7c67d9b59b0a0df94ee17d186441d2abeb852614f5079d6540ba6d68ff243
Confidence:Medium
Summary

This analysis was performed using vet and SafeDep Cloud Malicious Package Analysis. Integrate with GitHub using vet-action GitHub Action.

Package uses eval for global context, exhibits obfuscation, and triggers python_exec_complex YARA rules, suggesting malicious intent.

Details

The package @peculiar/x509 version 1.14.0 exhibits several suspicious behaviors that suggest it may be malicious. Specifically, the YARA rules python_exec_complex are triggered in x509.cjs.js and x509.es.js. While the rule name is misleading for javascript files, the matched string exec(pvtsutils.Convert.ToHex(guid)) indicates potentially dangerous code execution. Furthermore, the file x509.js triggers js_many_parseInt, suggesting obfuscation. Most importantly, the LLM Based File Evaluation Service flagged the use of eval in x509.js to obtain the global this context. Although the intention might be benign, eval introduces a significant security risk by allowing arbitrary code execution. The combination of obfuscation and eval makes the package highly suspect.