YARA match in changelog is insufficient; popular project with many stars and forks casts doubt on malicious intent.
No verification record available.
While Evidence 0 shows a YARA rule match suggesting potential use of the TOR network, this is insufficient evidence to classify the package as malware. The YARA rule 'tor_user' is known to be noisy and prone to false positives. The match is found within the CHANGELOG.md file, which is a documentation file, not an executable or script. The matched strings are commonplace and could simply refer to the browser used by a developer during testing or documentation. The project itself (html2canvas) is a well-known and widely used open-source library with a substantial number of stars and forks on GitHub, indicating a relatively high level of community scrutiny and trust. The absence of LLM-based file analysis prevents a more definitive conclusion, but the existing evidence does not support a malware classification.