Potentially risky octal string parsing flagged, but likely legitimate functionality within the trusted Babel compiler project. Not classified as malware.
While the LLM analysis and YARA rules flag potential code execution vulnerabilities due to octal string parsing, this package is published by the highly reputable @babel project with significant community trust (43k+ stars, 5k+ forks). Babel is a widely used JavaScript compiler, and string parsing is a common operation within its ecosystem. The identified behavior, while risky, is likely part of the intended functionality for handling escape sequences and not a deliberate attempt to inject malicious code. The confidence level is medium, and without stronger evidence of malicious intent or exploited vulnerabilities, it's safer to assume this is a necessary, albeit potentially risky, part of the package's functionality within the Babel compiler.
| File | Title | Confidence | |
|---|---|---|---|
package/lib/index.js | YARA rule 'python_exec_complex' matched file | Medium | |
package/lib/index.js.map | YARA rule 'python_exec_complex' matched file | Medium | |
package/lib/index.js.map | Code execution via string parsing | Medium |