JSPM

  • ESM via JSPM
  • ES Module Entrypoint
  • Export Map
  • Keywords
  • License
  • Repository URL
  • TypeScript Types
  • README
  • Created
  • Published
  • Downloads 11
  • Score
    100M100P100Q63813F
  • License MIT

Scan a codebase for malware signatures

Package Exports

    This package does not declare an exports field, so the exports above have been automatically detected and optimized by JSPM instead. If any package subpath is missing, it is recommended to post an issue to the original package (@mathiscode/codebase-scanner) to support the "exports" field. If that is not possible, create a JSPM override to customize the exports field for this package.

    Readme

    Codebase Scanner

    npm

    A quick and dirty tool to help defend against common developer-focused malware campaigns since many of these go unnoticed by common antivirus software.

    When a signature is found, the file is printed to the console and optionally fixed (if --fix is passed). When fixing, a header is prepended to the file to prevent the malware from running or being imported. This may not be foolproof, so always exercise caution and do everything possible to avoid letting the codebase run any scripts.

    Inspired by this experience (obfuscated Javascript steals your browser profiles and other files via a "test task" on freelancing sites, hidden within a seemingly innocuous codebase).

    Currently the signatures only target this specific type of Javascript malware, but more will be added over time. Signatures may be added for other file types as well.

    PRs welcome!

    Have you found a new signature? Please submit a PR with the signature added to signatures.js and a sample file attached in a comment.

    Usage

    # Just scan
    npx @mathiscode/codebase-scanner /path/to/codebase
    # ☠️ Found signature Obfuscated Javascript (Buffered "child_process") in file /path/to/codebase/malware.js
    # Scan and fix
    npx @mathiscode/codebase-scanner --fix /path/to/codebase
    # ☠️ Found signature Obfuscated Javascript (Buffered "child_process") in file /path/to/codebase/malware.js
    # ✅ Fixed file /path/to/codebase/malware.js

    Malicious File Header

    When a file is fixed, the following header is prepended to the file:

    ======== MALICIOUS ========
    This file has been flagged as malicious by https://github.com/mathiscode/codebase-scanner
    Please review the file and remove these lines if appropriate.
    ======== MALICIOUS ========