Analyze your own packages withvet GitHub

@rolldown/binding-wasm32-wasi@1.0.0-beta.44

Safe
Analyzed at:10/20/2025, 6:35:34 AM
Source:https://registry.npmjs.org/@rolldown/binding-wasm32-wasi/-/binding-wasm32-wasi-1.0.0-beta.44.tgz
SHA256:40f8dcc6562b5153616be7740a50621d04a46917c84211814d1db3341852aca1
Confidence:Medium
Summary

This analysis was performed using vet and SafeDep Cloud Malicious Package Analysis. Integrate with GitHub using vet-action GitHub Action.

Potentially vulnerable due to fs.readFileSync and eval, but needs more context to confirm malicious intent. Insufficient evidence to classify as malware.

Details

The code uses fs.readFileSync and eval to execute code from a file, which can lead to arbitrary code execution if the file path is attacker-controlled. However, without more context on how f is being used, it's hard to definitively say this is malicious. It could be part of the intended functionality and not exploitable. Therefore, I cannot classify the package as malware based on this single evidence.