Analyze your own packages withvet GitHub

better-auth@1.3.26

Suspicious
Analyzed at:10/3/2025, 4:43:09 PM
Source:https://registry.npmjs.org/better-auth/-/better-auth-1.3.26.tgz
SHA256:fa69556e3df7d3e12368ed71649c933f49605f76eb5f4ad35cb79954b4526378
Confidence:Medium
Summary

This analysis was performed using vet and SafeDep Cloud Malicious Package Analysis. Integrate with GitHub using vet-action GitHub Action.

Multiple YARA matches indicate password theft, Discord interaction, and code execution, suggesting malicious intent.

Details

The package exhibits multiple indicators of malicious behavior. The YARA rule discord_password_post_chat matched in two different files (better-auth.l_Ru3SGW.cjs and better-auth.CpZXDeOc.mjs), suggesting the package attempts to steal passwords and send them to Discord. Furthermore, the YARA rule download_sites matched in two different files (better-auth.l_Ru3SGW.cjs and better-auth.CpZXDeOc.mjs), indicating the package interacts with file hosting sites, specifically Discord's CDN. Additionally, the YARA rule python_exec_complex matched in two different files (better-auth.BToNb2fI.cjs and better-auth.DgGir396.mjs) indicating the package executes code from a complex expression. These multiple, strong indicators strongly suggest malicious intent.