Analyze your own packages withvet GitHub

hyatt-album@999.999.999

Suspicious
Analyzed at:10/23/2025, 5:29:45 AM
Source:https://registry.npmjs.org/hyatt-album/-/hyatt-album-999.999.999.tgz
SHA256:4920a1a6724db0420877e9bb24907de43199257dbefc4efbe1ca94c457870e9c
Confidence:Medium
Summary

This analysis was performed using vet and SafeDep Cloud Malicious Package Analysis. Integrate with GitHub using vet-action GitHub Action.

Multiple evidences suggest malicious behavior: system info exfiltration, arbitrary code execution via install scripts, and a suspicious version number.

Details

The package exhibits multiple strong indicators of malicious behavior. The install.js script collects sensitive system information and exfiltrates it to an external server ('https://webhook.site/hyatt'). This is confirmed by both YARA rule nodejs_phone_home and LLM analysis. Additionally, the package.json file defines 'install', 'postinstall', and 'preinstall' scripts that all execute 'node install.js', allowing arbitrary code execution during installation, which is a common malware technique. The extremely high version number (999.999.999) further raises suspicion.