Analyze your own packages withvet GitHub

hyatt-residential-roster@999.999.999

Suspicious
Analyzed at:10/23/2025, 5:29:10 AM
Source:https://registry.npmjs.org/hyatt-residential-roster/-/hyatt-residential-roster-999.999.999.tgz
SHA256:ab76f83ca967ad9fba17bb26612e481aee66468a0224c32d860495c19edfd213
Confidence:Medium
Summary

This analysis was performed using vet and SafeDep Cloud Malicious Package Analysis. Integrate with GitHub using vet-action GitHub Action.

Package is malware. Collects and exfiltrates sensitive data to an external server. Suspicious install scripts execute the same script multiple times.

Details

The package exhibits multiple strong indicators of malicious behavior. The install.js script collects sensitive system information (hostname, platform, uptime, user information, environment variables) and exfiltrates it to an external server ('https://webhook.site/hyatt'). This is confirmed by both YARA rule nodejs_phone_home and LLM-based file evaluation. Additionally, the package.json file defines 'install', 'postinstall', and 'preinstall' scripts that all execute the same install.js script, which is a highly suspicious practice used to obscure malicious intent by executing actions at different stages of the installation process. The YARA rule npm_preinstall_command also flags the package.json as suspicious. These multiple pieces of evidence strongly suggest malicious intent.