Low confidence YARA rule js_hex_obfuscation matched a .go file, likely a false positive. Not enough evidence to classify as malware.
No verification record available.
The YARA rule js_hex_obfuscation matched a .go file. This is likely a false positive since the rule is designed to detect JavaScript obfuscation, but the file is written in Go. The matched pattern $return also seems benign in the context of the provided code snippet. There is only one low confidence YARA rule match, which is not enough to classify the package as malware.