Analyze your own packages withvet GitHub

@img/sharp-linux-x64@0.34.4

Safe
Analyzed at:9/17/2025, 1:20:18 PM
Source:https://registry.npmjs.org/@img/sharp-linux-x64/-/sharp-linux-x64-0.34.4.tgz
SHA256:fa109bf1ca0554afa749872bf948a640383e4c7c7c327fedccb237491a346eb4
Confidence:Medium
Summary

This analysis was performed using vet and SafeDep Cloud Malicious Package Analysis. Integrate with GitHub using vet-action GitHub Action.

The package triggered sus_dylib_tls_get_addr YARA rule, but lacks sufficient evidence to be classified as malware. Likely a false positive.

Details

The package @img/sharp-linux-x64 version 0.34.4 triggered the YARA rule sus_dylib_tls_get_addr due to the presence of __tls_get_addr in the sharp-linux-x64.node file. While this indicates suspicious runtime dependency resolution, it's not sufficient evidence to classify the package as malware. The sharp package is a popular image processing library, and false positives are possible. Without further evidence of malicious intent or behavior, it's safer to assume this is a legitimate use of the function within the context of image processing and dynamic linking.