Analyze your own packages withvet GitHub

@rolldown/binding-wasm32-wasi@1.0.0-beta.45

Safe
Analyzed at:10/27/2025, 5:59:30 AM
Source:https://registry.npmjs.org/@rolldown/binding-wasm32-wasi/-/binding-wasm32-wasi-1.0.0-beta.45.tgz
SHA256:4a7c6162dd449d7ff4685278ece2a97ef3e2d50e98f52c882dba23f025f51da1
Confidence:Medium
Summary

This analysis was performed using vet and SafeDep Cloud Malicious Package Analysis. Integrate with GitHub using vet-action GitHub Action.

Potential arbitrary code execution via eval in wasi-worker.mjs, but not enough evidence to classify as malware.

Details

The provided evidence points to potential arbitrary code execution via importScripts in wasi-worker.mjs. The code reads and executes a file specified by the argument f using eval. While this pattern can be exploited, it's not definitive proof of malicious intent. Without further evidence, such as suspicious file paths or network activity, it's difficult to classify this package as malware. The use of eval is risky but not always malicious.