The npm package ts-runtime-compat-check
is a malicious package that functions as a key component in a remote code execution attack chain. This package:
Contains a postinstall
script that executes lib/install.js
The install script makes HTTP requests to a server specified by an environment variable APP_PROXY
(defaults to 'http://localhost' but typically set to https://proxy.eslint-proxy.site
by parent packages)
Sends the victim's application path as a query parameter to the malicious server
When the server returns specially crafted error messages, the package decodes them from base64 and executes them using new Function.constructor()
This creates a direct remote code execution capability
This package is utilized by other malicious packages like eslint-config-airbnb-compat
to establish a covert channel for executing arbitrary code. The separation of concerns across multiple packages appears designed to evade detection by security scanners.
-= Per source details. Do not edit below this line.=-
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
{ "malicious-packages-origins": [ { "id": "GHSA-hwqw-3w9q-499j", "source": "ghsa-malware", "ranges": [ { "events": [ { "introduced": "0" } ], "type": "SEMVER" } ], "modified_time": "2025-05-19T05:55:42Z", "import_time": "2025-05-20T00:38:32.990227481Z", "sha256": "1dfc8edb1a3ebdf6a94dd7c031b9535b886f14801458f2251b6783fe4feea5ea" } ] }