Malicious code detected: exec(doc.location.toString()) allows arbitrary code execution, posing a significant security risk.
No verification record available.
The evidence suggests a high likelihood of malicious behavior. While the project on GitHub has a moderate number of stars and forks, the YARA analysis reveals a critical finding: the detection of the exec(doc.location.toString()) code within the index.cjs file. This code snippet attempts to execute the content of the current document's location, which is a highly suspicious action. This could allow arbitrary code execution, potentially leading to a compromise of the system where the package is installed. The use of $exec in the YARA match further reinforces this suspicion. The lack of LLM analysis doesn't negate this strong indicator of malicious intent; the YARA finding, in this context, is sufficiently alarming. The potential for remote code execution via the manipulation of doc.location presents a significant security risk.