feishu-bitable

Fail

Audited by Socket on Feb 28, 2026

22 alerts found:

Obfuscated Filex22
Obfuscated FileHIGH
scripts/table/batch-create.js

This module implements an obfuscated licensing/telemetry/enforcement mechanism: it fingerprint devices (via execSync of system commands), computes machine-specific hashes, persists license/usage data to local files, validates signatures, sends telemetry/registration JSON to a remote HTTPS endpoint using an Authorization token from the config, and forcibly exits the process when validation fails. There is no evidence of a remote command execution backdoor, reverse shell, or explicit credential hardcoding in the provided fragment, but the module collects privacy-sensitive hardware identifiers and transmits them to a remote server and enforces usage limits by terminating the process. The obfuscation, fingerprinting and automatic network transmission without clear user consent make it a moderate supply-chain/privacy risk and worth removal or close review before use.

Confidence: 95%
Obfuscated FileHIGH
scripts/parse-bitable-url.js

This file is an obfuscated licensing/authorization client that fingerprints the host, verifies and updates local license/usage state, and contacts a remote HTTPS service for validation. I found no clear signs of classic malware (no code download-and-execute, no reverse shell, no destructive file ops). The main concerns are privacy (collection and transmission of hardware identifiers) and operational impact (process exits on failed checks). Obfuscation and embedded verification keys/strings make auditing difficult — treat as moderately risky in a supply chain context and only use if you trust the package publisher and accept machine fingerprinting and remote validation behavior.

Confidence: 98%
Obfuscated FileHIGH
scripts/table/list.js

This module implements obfuscated license/activation logic: it fingerprints the host (via execSync/system commands), validates local license files, contacts a remote licensing API using tokens from a config file, writes license state locally, and exits the process if the license is invalid or expired. It does not show classic malware behavior (reverse shell, arbitrary remote command execution, credential harvesting beyond reading expected tokens, or code injection). Main risks are privacy (hardware fingerprinting and transmission), forced availability impact (process.exit on failed checks), and the obfuscation which hampers auditing. If you require a fully open-auditable dependency or do not expect remote licensing behavior, treat this as suspicious and consider alternatives.

Confidence: 98%
Obfuscated FileHIGH
scripts/record/batch-create.js

This code implements a license enforcement mechanism with intentional obfuscation. It fingerprints the host machine (via execSync of system commands), derives machine identifiers/hashes, persists license/trial state to disk, and sends user-supplied data (from a CLI-provided JSON) to a remote HTTPS endpoint with an Authorization header. It also forces process termination when license checks fail. While these behaviors are consistent with a proprietary license/telemetry client rather than classic malware (no remote shell, no arbitrary code execution, no crypto-mining), they present supply-chain and privacy risks: sensitive hardware identifiers are collected and potentially transmitted, files are created/modified in the host project, network calls are made to an external domain, and the package can halt execution of the host program. Use in a third-party project could therefore be undesirable or dangerous depending on trust/consent. I recommend treating this as a high-risk library for inclusion in environments where privacy, uptime, or untrusted network communications are concerns.

Confidence: 98%
Obfuscated FileHIGH
scripts/field/delete.js

This module implements an obfuscated license/activation and remote fetch flow that fingerprints the host, validates/writes local license/state files and contacts a remote HTTPS endpoint using tokens from a local config. The code is strongly obfuscated and performs sensitive actions (execSync to read hardware identifiers, HMAC signing, sending Authorization headers to remote host, and writing license files). I did not find explicit destructive or remote-shell behavior, but the combination of host fingerprinting, remote communication using local tokens, and strong obfuscation is suspicious for a package in a public supply chain. If you don’t expect license enforcement or outbound calls in this module, treat it as high-risk and audit the remote endpoint and the config/token provenance before use.

Confidence: 95%
Obfuscated FileHIGH
scripts/record/create.js

This file implements a license/usage enforcement and CLI operation flow: it fingerprints the host (execSync), computes hashes, persists license/usage files, validates signatures, and issues HTTPS requests including tenant tokens and machine identifiers to remote APIs. There is no evidence of remote code execution/backdoor or cryptominer, but the code is intentionally obfuscated, performs privacy-impacting hardware fingerprinting, persists local license files and transmits sensitive data (tokens, machine id) to remote endpoints. That behavior is expected for licensing but is privacy-invasive and raises supply-chain concerns because of embedded keys and heavy obfuscation. I classify it as not clearly malicious but moderately risky: suitable for removal or closer review if you do not trust its origin.

Confidence: 90%
Obfuscated FileHIGH
scripts/field/update.js

This module implements an obfuscated licensing/usage enforcement mechanism. It collects hardware identifiers (via execSync/wmic), computes hashes, reads/writes license and cache files on disk, validates signatures, and performs HTTPS PUT requests to a hardcoded remote licensing endpoint using tokens from a provided parameter file. It does not contain obvious remote command execution or reverse-shell behavior, but it does perform sensitive data collection and exfiltration (hardware identifiers and usage telemetry) and enforces process termination when license checks fail. Treat this package as privacy-sensitive and potentially unsafe for inclusion in dependencies without explicit review and user consent. If you do not expect a dependency to perform licensing, hardware fingerprinting, or network calls to an external service, consider this high-risk and audit or remove it.

Confidence: 98%
Obfuscated FileHIGH
scripts/table/delete-one.js

This file is an obfuscated license/activation/enforcement component that fingerprints the host (CPU/motherboard/BIOS via execSync), computes hashes/HMACs for machine identification, validates and persists license state to local files, and performs authenticated HTTPS requests to a remote API. It will terminate the process when license checks fail. I see no direct evidence of remote code execution, reverse shells, or plaintext credential exfiltration, but the deliberate obfuscation, hardware fingerprinting, and ability to remotely enforce process termination represent a moderate supply-chain security and privacy risk. Recommend decoding the obfuscated strings to identify remote endpoints and commands, auditing the remote API and token use, and avoiding this module in privacy-sensitive contexts or preferring an open, non-obfuscated licensing mechanism.

Confidence: 98%
Obfuscated FileHIGH
scripts/media/upload.js

This module implements file upload features and a machine-bound license/trial enforcement subsystem. It collects hardware identifiers via executed system commands, computes a machine fingerprint, stores usage/license files locally, and communicates with remote HTTPS endpoints to validate licenses and upload files. The code is intentionally obfuscated and hides endpoints and messages. The behavior is privacy-sensitive (collecting hardware IDs) and can be disruptive (forcefully exiting the process on license or error conditions). I did not find clear evidence of a remote command backdoor or data-exfiltration beyond the intended uploads and license checks, but the obfuscation and collection of machine identifiers combined with network transmissions raise supply-chain/privacy concerns. Recommend deobfuscating strings and verifying remote endpoints and privacy policy before use in production.

Confidence: 90%
Obfuscated FileHIGH
scripts/record/update.js

This file is a licensing/activation module that collects machine identifiers (via system commands and local data), validates/stores license files locally, and posts machine/license information to a remote licensing server. It uses deliberate string obfuscation and will terminate the process if authorization fails. I do not find evidence of classic malware (remote shell, credential harvesting beyond license/token telemetry, filesystem-destructive actions, cryptomining), but it does phone home with hardware identifiers and enforces license-based shutdowns — privacy-invasive and potentially undesirable for some deployments. Treat this as a non-malicious but moderately risky supply-chain/telemetry/licensing component; review policy and network endpoints before use.

Confidence: 98%
Obfuscated FileHIGH
scripts/field/create.js

This file is an obfuscated license/activation client that fingerprints hosts, signs and verifies license/trial files, persists usage state locally, and communicates with a remote activation server using a configured bearer token. It is not a self-evident backdoor or remote code execution implant, but it performs sensitive telemetry (hardware IDs) and can enforce lockout via process.exit and persisted state. The obfuscation and embedded signing secrets (assembled from constants) increase risk: auditing is difficult and keys may be recoverable, enabling forgery or privacy issues. Recommend: treat as privacy-invasive; audit and deobfuscate the string table to identify remote endpoints and any embedded keys, validate the server domain and business reasons for fingerprinting, and avoid deploying this in high-sensitivity environments unless the licensing behavior is explicitly required and acceptable.

Confidence: 98%
Obfuscated FileHIGH
scripts/record/get.js

This file implements an obfuscated license/activation client that fingerprints the host (CPU/motherboard/BIOS), computes/verifies signatures, reads/writes local license files, and contacts an external HTTPS license service to validate authorization. It is privacy-invasive (hardware identifiers sent to remote server) and enforces availability by exiting the process when checks fail. There is no clear evidence of remote code execution, backdoor, cryptominer, or shell creation — rather license enforcement and telemetry. Use with caution: treat as potentially unwanted telemetry or restrictive licensing logic; if you do not trust the remote endpoint or need privacy, avoid or sandbox this module.

Confidence: 95%
Obfuscated FileHIGH
scripts/media/file-token-to-url.js

This module implements obfuscated license/activation logic: it fingerprints the machine (CPU/motherboard/BIOS via execSync), derives signed machine identifiers, persists/validates license and usage JSON files on disk, and contacts a remote HTTPS endpoint with tokens and the machine identifier. It enforces authorization by exiting the process on failures. While it is not an obvious remote backdoor or destructively malicious (no shell or remote code execution), its combination of heavy obfuscation, hardware fingerprinting, telemetry/exfiltration of identifying data, and ability to disable the host application constitute a meaningful supply-chain/privacy risk. Treat as high-risk for inclusion unless this behavior is explicitly expected and trusted by the application owner.

Confidence: 98%
Obfuscated FileHIGH
scripts/record/delete.js

The code is heavily obfuscated and engages in hardware fingerprinting, cryptographic signing, and remote license verification. While such patterns can be legitimate for anti-piracy measures, the combination of: collecting machine identifiers via shell commands, hashing/signing with internal routines, and sending Authorization-protected requests to an external endpoint, raises privacy and supply-chain concerns. There is potential for data exfiltration or unintended side effects if the remote endpoint is controlled by an attacker or if the overall logic is altered by hidden branches. Given the obfuscation level and data flow, the code should undergo thorough security and privacy review before being included in a distribution channel.

Confidence: 92%
Obfuscated FileHIGH
scripts/table/batch-delete.js

This file is an obfuscated license/trial enforcement component. It fingerprints the host (executes system commands), computes a machine-bound hash, validates or creates signed usage/license JSON files on disk, and contacts a remote HTTPS endpoint while sending configuration and Authorization bearer tokens. It does not show typical patterns of active malware (no remote shell, no arbitrary command execution from remote input), but it performs privacy-invasive telemetry (hardware identifiers and tokens) and enforces behavior by terminating the process. The obfuscation and outbound transmission of sensitive tokens increase supply-chain and privacy risk. Treat as moderate risk: audit provenance and remote endpoints before trusting or bundling into other tooling.

Confidence: 98%
Obfuscated FileHIGH
scripts/record/batch-update.js

This module is obfuscated and performs aggressive license/telemetry behavior: it fingerprints the host (wmic outputs), computes machine IDs, stores license/usage files locally, and POSTS JSON containing config and machine identifiers to an external HTTPS endpoint. It enforces licensing by exiting the process when validation fails. While it does not contain a clear reverse shell or immediate destructive payload, the combination of obfuscation, hardware fingerprinting and network exfiltration of identifying data makes this a potentially unwanted or risky dependency in many projects (privacy and availability risk). If you do not expect license enforcement or telemetry in this library, treat it as suspicious and avoid installing it. If legitimate, obtain source from a trusted upstream and verify the unobfuscated code and endpoint.

Confidence: 90%
Obfuscated FileHIGH
scripts/record/batch-get.js

This module implements an obfuscated license/usage enforcement mechanism. It gathers hardware identifiers (via execSync), computes a machine fingerprint, persists license/usage data locally, validates license codes, and sends machine/app data to a remote HTTPS endpoint using an Authorization token read from configuration. The code is privacy-invasive (collects persistent identifiers) and uses intentional obfuscation, and it will terminate the process when license checks fail. I did not find evidence of destructive malware (reverse shells, cryptominers, or broad data exfiltration beyond machine/app identifiers), but the telemetry and enforcement behavior pose privacy and availability risks. Recommend manual review of deobfuscated strings (endpoint and messages), and caution before including this package in sensitive environments.

Confidence: 92%
Obfuscated FileHIGH
scripts/get-tenant-access-token.js

This module is an obfuscated license/usage enforcement component. It fingerprints the host machine (via execSync/system files), computes hashes, reads and writes license/usage files, validates signatures, and contacts a remote licensing HTTPS endpoint using app credentials read from a local config. It enforces authorization by terminating the process when checks fail. The main security concerns are privacy/telemetry (exfiltration of machine identifiers and app credentials to the remote licensing server), disk persistence of identifiers and signatures, and the use of execSync (sensitive system command execution). There is no clear evidence of backdoors, remote code execution, or direct destructive behavior in this snippet, but the obfuscation and network exfiltration of fingerprints warrant caution and review of the remote endpoint and how app secrets are managed.

Confidence: 90%
Obfuscated FileHIGH
scripts/record/batch-delete.js

This script is an obfuscated CLI tool implementing machine-locked licensing: it fingerprints the host via execSync, computes HMACs, stores/reads local license/usage files, enforces authorization (exit on failure), and posts records to a remote HTTPS endpoint using a provided bearer token. The code is intentionally obfuscated which hides its strings and flow. I did not find code that performs direct malicious actions like spawning shells, executing remote code, or explicit credential harvesting beyond using the tenant/token from the provided JSON to call the remote API. However, it performs invasive actions (host fingerprinting, telemetry/exfiltration of CLI data) and forcibly exits the process when not authorized. Use with caution: treat as potentially unwanted in environments that require transparency or where forced exits or telemetry are unacceptable.

Confidence: 98%
Obfuscated FileHIGH
scripts/table/create-single.js

This module implements an obfuscated license/anti-piracy mechanism: it collects hardware identifiers via system commands, computes hashes, reads/writes local license/usage files, validates license signatures, and contacts a remote licensing server (HTTPS POST) using an Authorization header read from config. It enforces authorization by exiting the process when checks fail. While it does not show clear signs of remote code execution, backdoor shells, or cryptomining, it does perform sensitive data collection (hardware fingerprinting) and exfiltrates that data to an external server, and it forcibly terminates the host process on failure. The heavy obfuscation of strings and logic increases supply-chain risk because intent is concealed and review is harder. If you plan to use this package in shared or production environments, treat it as potentially dangerous for privacy and availability and review licensing needs and server endpoints thoroughly.

Confidence: 90%
Obfuscated FileHIGH
scripts/field/list.js

This module implements obfuscated license/activation and telemetry enforcement. It collects hardware identifiers via WMIC, creates machine hashes, stores license/usage JSON files on disk (project dir + user home), validates HMAC/signatures, and contacts a remote HTTPS API using Authorization headers containing tenant/access tokens read from a local config. It will forcibly exit the process when license checks fail. While there is no evidence of a remote code execution backdoor or reverse shell, the module exhibits privacy-invasive behavior (fingerprinting and token exfiltration), uses heavy obfuscation, and can terminate host processes — making it potentially unsafe to include in projects unless the behavior is expected and trusted. Recommend treating this as a medium-risk supply-chain component and auditing where the remote API endpoints point, what tokens/config are supplied, and obtaining the un-obfuscated source from the author or a trusted repository before use.

Confidence: 95%
Obfuscated FileHIGH
scripts/table/update.js

This module is an intentionally-obfuscated licensing/telemetry client that fingerprints the host (CPU/motherboard/BIOS), computes HMAC/hashed identifiers, validates/persists license and usage data locally, and sends signed telemetry/license payloads to a remote HTTPS endpoint. The code is not overtly destructive or a remote code execution backdoor, but it performs privacy-invasive device fingerprinting and exfiltrates persistent identifiers and usage telemetry. Use only if the vendor is trusted and the telemetry/licensing behavior is acceptable in your threat model; otherwise remove/replace. Further review of the obfuscated strings and the remote endpoint (ownership, destination) is recommended.

Confidence: 98%
Audit Metadata
Analyzed At
Feb 28, 2026, 08:21 PM
Package URL
pkg:socket/skills-sh/steelan9199%2Fwechat-publisher-skill%2Ffeishu-bitable%2F@157458be77c14404cb08019bcd4de730b1177d92