YARA rule python_exec_complex matched a JavaScript file, likely a false positive. Insufficient evidence to classify as malware.
The YARA rule python_exec_complex matched a JavaScript file (parse.js). This rule is designed to detect potentially malicious Python code execution. Applying it to a JavaScript file is likely a false positive. While the matched string $exec is present in the code, its context exec(remaining()) within a JavaScript file does not indicate malicious intent without further evidence. Therefore, based on this single YARA rule match on a non-Python file, the package is not classified as malware.
| File | Title | Confidence | |
|---|---|---|---|
package/lib/parse.js | YARA rule 'python_exec_complex' matched file | Medium |