Weak evidence. YARA matches are low confidence and could be false positives. Not enough to classify as malware.
No verification record available.
The package is not a malware because the evidences are weak. All the YARA rules matches have low confidence and there are no strong indicators of malicious activity. The YARA rule python_exec_complex matched a non-python file package/src/env/color-depth.ts and package/dist/env-DwlNAN_D.mjs, which is a red flag. The other YARA rules such as download_sites, possible_oauth_stealer, and discord_password_post_chat are related to security but can be related to legitimate use cases.