Analyze your own packages withvet GitHub

@rolldown/binding-wasm32-wasi@1.0.0-beta.38

Safe
Analyzed at:9/15/2025, 9:53:14 AM
Source:https://registry.npmjs.org/@rolldown/binding-wasm32-wasi/-/binding-wasm32-wasi-1.0.0-beta.38.tgz
SHA256:b44778d30667ea2635f9d1410dec2cc9e9d45e74a5e5efa883bcfd9ef4392eea
Confidence:Medium
Summary

This analysis was performed using vet and SafeDep Cloud Malicious Package Analysis. Integrate with GitHub using vet-action GitHub Action.

Potential arbitrary code execution vulnerability in wasi-worker.mjs but no definitive evidence of malicious intent or attacker control.

Details

The evidence points to potential arbitrary code execution via importScripts in wasi-worker.mjs. However, the analysis does not definitively state that the file path f is attacker-controlled or influenced by untrusted input. Without confirmation of attacker control, it is not possible to conclude with certainty that the package is malicious. It is a potential vulnerability, but not definitive malware.