SafeDep
Install GitHub App

Summary

Note: This report is updated by a verification record

Package is malware. Collects and exfiltrates sensitive info (SSH keys, credentials, env vars) via insecure HTTPS/HTTP after install.

Verification Record

The package is marked as malware by OSV: MAL-2026-2616 with source: ghsa-malware

Details

Note: This report is updated by a verification record

The package exhibits multiple strong indicators of malicious behavior. The postinstall.js script attempts to collect sensitive information including SSH keys, AWS/GCP credentials, environment variables, and bash/zsh history. It executes system commands to gather user, system, disk, and network information. The collected data is then exfiltrated to a remote server (p1s.uk) via HTTPS with disabled SSL certificate validation and a fallback to HTTP, making the connection vulnerable to man-in-the-middle attacks. The YARA rules also confirm these findings, detecting access to sensitive files and system information exfiltration. The postinstall script in package.json triggers the execution of postinstall.js immediately after installation, a common malware technique. The project has only one published version, raising further suspicion.

upstartapplicationstatus@99.99.1Malicious
Verified
Analysed at: 4/12/26, 10:44 AM
Source: https://registry.npmjs.org/upstartapplicationstatus/-/upstartapplicationstatus-99.99.1.tgz
SHA256: ac92497aedfb17883bf4bd99cf40710a59a44aa49577c60e81ce4160bec2538c
Confidence: High