Package not classified as malware. YARA matches are low confidence and explainable by legitimate use cases such as analytics and Dockerfiles.
No verification record available.
The package golang.org/x/net version 0.49.0 is not classified as malware based on the provided evidence. While several YARA rules have matched files within the package, they all have low confidence and do not strongly indicate malicious intent. Specifically:
hardcoded_analytics in go1.html suggests the presence of a Google Analytics ID, which is commonly used for website tracking and not inherently malicious.foreign_object_script in webkit/tests10.dat and webkit/webkit02.dat indicates the use of SVG content with scripting, which can be a potential security risk but also a legitimate feature in certain contexts.hardcoded_ip_port in h2i/README.md shows a hardcoded IP address and port, which is likely an example or test case.js_hex_obfuscation in hpack/encode.go is a false positive because the file is a go file, not javascript.possible_dropper in internal/quic/cmd/interop/Dockerfile flags the use of wget and other commands commonly found in Dockerfiles for downloading and building software.very_high_entropy in publicsuffix/data/children does not provide enough information to classify the package as malicious.Since all the matches are of low confidence and can be explained by legitimate use cases, the package is not considered malware.