SafeDep
Install GitHub App

Summary

Note: This report is updated by a verification record

Malicious package with postinstall script exfiltrating sensitive system data to a remote server. Multiple YARA rules and LLM analysis confirm.

Verification Record

The package is marked as malware by OSV: MAL-2026-2612 with source: ghsa-malware

Details

Note: This report is updated by a verification record

The package contains a postinstall.js script that exhibits multiple malicious behaviors. It collects sensitive system information, including environment variables, SSH keys, AWS credentials, Docker configurations, and the output of various system commands. This data is then exfiltrated to a remote server (p1s.uk) using HTTP/HTTPS POST requests. The script also accesses shell histories and GCP credentials. Multiple YARA rules confirm these behaviors, including user_sys_net_disk_recon, id_rsa_not_ssh, bash_history_high, zsh_history, nodejs_sysinfoexfil, nodejs_phone_home, gcp_ssh_credentials, linux_server_stealer, curl_https_ssh, and exfil_whoami_hostname. LLM analysis further confirms data exfiltration, environment variable harvesting, file content reading and exfiltration, and command execution with output exfiltration. The presence of a postinstall script executing arbitrary code adds to the suspicion.

upstart-loan-status@99.99.1Malicious
Verified
Analysed at: 4/12/26, 9:51 AM
Source: https://registry.npmjs.org/upstart-loan-status/-/upstart-loan-status-99.99.1.tgz
SHA256: 7385090001e80688bb260c508f4fb5a81ad262833423b411001cef237561cb24
Confidence: High