Analyze your own packages withvet GitHub

@img/sharp-linux-arm@0.34.4

Safe
Analyzed at:9/17/2025, 1:20:21 PM
Source:https://registry.npmjs.org/@img/sharp-linux-arm/-/sharp-linux-arm-0.34.4.tgz
SHA256:eed853622c4aa83f4105d5e8cf0ca932c1bd4d085d167d0f0e5a04988e1d655c
Confidence:Medium
Summary

This analysis was performed using vet and SafeDep Cloud Malicious Package Analysis. Integrate with GitHub using vet-action GitHub Action.

Single YARA match sus_dylib_tls_get_addr on .node file is not sufficient to classify as malware. Needs further investigation.

Details

The YARA rule sus_dylib_tls_get_addr matched the file sharp-linux-arm.node. This rule detects suspicious runtime dependency resolution using __tls_get_addr. While this is suspicious, it's not definitive evidence of malware. The matched file is a .node file, which is a native addon for Node.js. It's possible that the use of __tls_get_addr is legitimate within the context of this addon for thread-local storage access. Without further evidence of malicious intent, it's not possible to classify this package as malware based on this single YARA rule match.