data-processor
Audited by Socket on Feb 16, 2026
2 alerts found:
Obfuscated FileMalwareThis module contains explicit backdoor functionality: a trigger-based activation that downloads a base64-encoded payload and exec()utes it, plus an embedded reverse-shell spawn to attacker.example.com:4444. Both behaviors enable remote code execution and full interactive remote control. The code should be treated as malicious; do not run it in production or on sensitive hosts. If this appears in a dependency, remove or isolate the package, and investigate where and how the file was introduced.
The described fragment indicates a high likelihood of malicious behavior: multi-stage backdoor with payload fetch, remote execution, and reverse shell, coupled with data exfiltration potential and unauthorized tool usage. Given the absence of executable code to inspect, treat this as a severe supply-chain risk and block distribution of such code until a vetted, sanitized version is analyzed.