MAL-2023-1500

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/npm/wpi-rules-valid-events/MAL-2023-1500.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2023-1500
Published
2023-08-20T07:24:41Z
Modified
2023-08-20T07:24:41Z
Summary
Malicious code in wpi-rules-valid-events (npm)
Details

-= Per source details. Do not edit below this line.=-

Source: ossf-package-analysis (1f8f8319f361dae60da61058ccd4776881160f6a820fbad5fe51373e6084e45b)

The OpenSSF Package Analysis project identified 'wpi-rules-valid-events' @ 6.6.6 (npm) as malicious.

It is considered malicious because: - The package communicates with a domain associated with malicious activity. - The package executes one or more commands associated with malicious behavior.

Database specific
{
    "malicious-packages-origins": [
        {
            "source": "ossf-package-analysis",
            "modified_time": "2023-08-20T07:24:41.505310967Z",
            "sha256": "1f8f8319f361dae60da61058ccd4776881160f6a820fbad5fe51373e6084e45b",
            "versions": [
                "6.6.6"
            ],
            "import_time": "2023-08-20T07:34:26.59779591Z"
        }
    ]
}
References
Credits

Affected packages

npm / wpi-rules-valid-events

Package

Name
wpi-rules-valid-events
View open source insights on deps.dev
Purl
pkg:npm/wpi-rules-valid-events

Affected ranges

Affected versions

6.*

6.6.6