Potential arbitrary code execution vulnerability, but insufficient evidence to classify as malware. Report vulnerability to maintainers.
The provided evidence points to a potential arbitrary code execution vulnerability in wasi-worker.mjs due to the use of eval with fs.readFileSync within the importScripts function. While this is a serious security concern, it doesn't definitively indicate malicious intent. The code could be part of a legitimate but poorly designed feature. Without further evidence of malicious behavior or intent, it is not possible to classify this package as malware. It is recommended to report this vulnerability to the package maintainers for remediation.
| File | Title | Confidence | |
|---|---|---|---|
package/wasi-worker.mjs | Arbitrary Code Execution via importScripts | Medium |