Potentially malicious package due to YARA detection of remote code execution via exec(doc.location.toString()).
No verification record available.
The evidence suggests a high likelihood of malicious behavior. While the project has a reasonable number of stars and forks on GitHub, the YARA analysis reveals a critical finding: the detection of the exec(doc.location.toString()) code within the index.cjs file. This code snippet is highly suspicious. The exec() function executes arbitrary code, and in this context, doc.location.toString() likely retrieves the current URL. A malicious actor could use this to execute arbitrary code from a remote location controlled by the attacker, potentially leading to a wide range of harmful actions, such as data exfiltration, system compromise, or further malware installation. The presence of $exec in the YARA match further strengthens this suspicion. Although we lack LLM-based analysis, the severity of the YARA finding, coupled with the potential for remote code execution, outweighs the relatively benign project metadata. The confidence level of the YARA analysis is also medium, indicating a moderate degree of certainty in the finding. Therefore, the package is classified as potentially malicious.