Analyze your own packages withvet GitHub

@ctrl/deluge@7.2.2

Malicious
Verified
Analyzed at:9/15/2025, 8:14:35 PM
Source:https://registry.npmjs.org/@ctrl/deluge/-/deluge-7.2.2.tgz
SHA256:bc18414929992e8e8d2211f9c51ebc7241294a1af3cfdbdd5ca417974b2dac0b
Confidence:High
Summary

This analysis was performed using vet and SafeDep Cloud Malicious Package Analysis. Integrate with GitHub using vet-action GitHub Action.

Note: This report is updated by a verification record

Suspicious postinstall script executing bundle.js and YARA rule match indicate potential malware.

Verification Record

Package has credential harvesting behaviour and found in known malicious campaign.

Package has credential harvesting behaviour and found in known malicious campaign.

Details

Note: This report is updated by a verification record

The package exhibits suspicious behavior. The postinstall script executes node bundle.js, which is highly unusual and indicates potential malicious activity. The bundle.js file also triggers the unsigned_bitwise_math_excess YARA rule, further raising suspicion. The combination of these factors suggests that the package is likely malicious.

Suspicious postinstall script execution
LLM Based File Evaluation Service
Medium