Analyze your own packages withvet GitHub

@rolldown/binding-wasm32-wasi@1.0.0-beta.47

Safe
Analyzed at:11/5/2025, 4:42:11 AM
Source:https://registry.npmjs.org/@rolldown/binding-wasm32-wasi/-/binding-wasm32-wasi-1.0.0-beta.47.tgz
SHA256:e4abe9c70d96cf409e3bb068f02b7fb42ebc69e335c161adf277ce4034268294
Confidence:Medium
Summary

This analysis was performed using vet and SafeDep Cloud Malicious Package Analysis. Integrate with GitHub using vet-action GitHub Action.

Potential arbitrary code execution vulnerability, but insufficient evidence to classify as malware. Report vulnerability to maintainers.

Details

The provided evidence points to a potential arbitrary code execution vulnerability in wasi-worker.mjs due to the use of eval with fs.readFileSync within the importScripts function. While this is a serious security concern, it doesn't definitively indicate malicious intent. The code could be part of a legitimate but poorly designed feature. Without further evidence of malicious behavior or intent, it is not possible to classify this package as malware. It is recommended to report this vulnerability to the package maintainers for remediation.