Affected script: "install-scripts:preinstall"
The script checks disk space and may delete directories within the npm temporary folder. While disk space check and cleanup are not inherently malicious, the arbitrary deletion of directories could be exploited in a way that could interfere with or sabotage other npm operations, potentially leading to unintended consequences or the removal of important files if the npm temporary directory is used by other processes or workflows. Additionally, the script suppresses all output and errors (with &>/dev/null
), which is a tactic often used by malicious scripts to hide their activity. However, since the deletion is constrained to older directories (+10 minutes) and only within the npm temp folder, it might be intended for cleanup purposes, but it can still be risky and may inadvertently remove important files that happen to be within this directory and more than 10 minutes old.
Affected script: "install-scripts:postinstall"
The script seems to be dangerous because it recursively deletes directories that might be crucial for the system without authorization, moves and links files which could disrupt normal operations, and executes commands that could be used to prepare the system for further malicious actions. The suppression of all output (&>/dev/null
) is often used in scripts to hide their activities. Additionally, the script uses command substitution without proper validation or sanitization, which could be abused for code injection if the environment variables are compromised or the domotz_npm
command is malicious. Overall, it exhibits behavior that could be used to harm the system or prepare it for further exploitation.
domotz-remote-pawn
's direct dependencies. Data on all dependencies, including transitive ones, is available via CSV download.Name | Version | Size | License | Type | Vulnerabilities |
---|---|---|---|---|---|
big-integer | 1.6.52 | 30.58 kB | Unlicense | prod | |
semver | 5.7.2 | 17.45 kB | ISC | prod |