Analyze your own packages withvet GitHub

hyatt-avatar@999.999.999

Suspicious
Analyzed at:10/23/2025, 5:23:19 AM
Source:https://registry.npmjs.org/hyatt-avatar/-/hyatt-avatar-999.999.999.tgz
SHA256:ca1fd695dbdcd17f1d840918b255fed1580b1b3964729a53f627233e6e6f462f
Confidence:Medium
Summary

This analysis was performed using vet and SafeDep Cloud Malicious Package Analysis. Integrate with GitHub using vet-action GitHub Action.

Package collects system info and sends to untrusted server, plus suspicious install scripts indicate malicious behavior.

Details

The package exhibits multiple strong indicators of malicious behavior. The install.js script collects sensitive system information (hostname, platform, uptime, user info, environment variables) and sends it to an external, untrusted server (webhook.site/hyatt). This is confirmed by both YARA rule nodejs_phone_home and LLM analysis. Additionally, the package.json file defines install, postinstall, and preinstall scripts that all execute node install.js, enabling arbitrary code execution during installation. This is flagged by both YARA rule npm_preinstall_command and LLM analysis. The combination of data exfiltration and suspicious install scripts strongly suggests malicious intent.