helo-world
Audited by Socket on Mar 10, 2026
2 alerts found:
Malwarex2This code is malicious and presents a high security risk. It actively reads environment secrets and attempts to exfiltrate them to attacker-controlled domains via child_process.exec (curl) and fetch, uses dynamic code execution (eval and new Function) to access/execute code, and references local credential file locations. Even if some constructs would raise runtime errors as-is, the intent and direct exfiltration command (exec with curl including AWS_SECRET_KEY) make this unsuitable for use. Remove and do not execute; treat any environment or keys present on a host where this ran as potentially compromised.
This install script is malicious or extremely high risk: it executes a remote script fetched over insecure HTTP and depends on at least one suspicious package. Do not install. Treat this as a confirmed malware installation vector until proven otherwise; inspect the remote script and all dependencies in a safe, isolated environment if you must analyze further.