This analysis was performed using vet and SafeDep Cloud Malicious Package Analysis. Integrate with GitHub using vet-action GitHub Action.
Multiple YARA matches indicate password theft, Discord interaction, and code execution, suggesting malicious intent.
The package exhibits multiple indicators of malicious behavior. The YARA rule discord_password_post_chat matched in two different files (better-auth.l_Ru3SGW.cjs and better-auth.CpZXDeOc.mjs), suggesting the package attempts to steal passwords and send them to Discord. Furthermore, the YARA rule download_sites matched in two different files (better-auth.l_Ru3SGW.cjs and better-auth.CpZXDeOc.mjs), indicating the package interacts with file hosting sites, specifically Discord's CDN. Additionally, the YARA rule python_exec_complex matched in two different files (better-auth.BToNb2fI.cjs and better-auth.DgGir396.mjs) indicating the package executes code from a complex expression. These multiple, strong indicators strongly suggest malicious intent.