Note: This report is updated by a verification record
YARA detected exec() function call, suggesting code injection. Low GitHub stars increase suspicion. High risk of malicious activity.
Manual analysis confirmed that the package is safe and does not contain any malicious code.
Note: This report is updated by a verification record
The evidence suggests a high probability of malicious behavior. While YARA rules are known to produce false positives, the detection of the exec() function within a complex string manipulation context (string.toLowerCase()) raises significant concerns. The exec() function, when used with user-supplied or untrusted input, is a common technique for code injection attacks. The fact that the input is being lowercased before execution doesn't mitigate the risk; it's a simple obfuscation technique. The lack of LLM-based analysis prevents definitive confirmation, but the YARA finding, coupled with the relatively low project popularity (55 stars, 11 forks) on GitHub, warrants a high degree of suspicion. The potential for arbitrary code execution makes this package a serious threat.