Skip to content

Update manifest files with the latest threats#34

Open
obarrera wants to merge 1 commit intomainfrom
update-threat-manifests-1746623468
Open

Update manifest files with the latest threats#34
obarrera wants to merge 1 commit intomainfrom
update-threat-manifests-1746623468

Conversation

@obarrera
Copy link
Collaborator

@obarrera obarrera commented May 7, 2025

This PR updates the manifest files with the latest threats.

@socket-security
Copy link

Review the following changes in direct dependencies. Learn more about Socket for GitHub.

Diff Package Supply Chain
Security
Vulnerability Quality Maintenance License
Addedxcepthttp@​0.0.2191009710070
Addedrunwifi@​3.8.5.122100100100100
Addedbindepend@​0.1231009910070
Addedtronlinkperm@​0.0.18210092100100
Addedvaliddocbr@​1.2.210010087100100
Addedopenapi-client-generator@​1.0.139310098100100
Addedgoes-api@​0.1.710010010010070
Addedpyrebase4@​4.8.099100100100100

View full report

@socket-security
Copy link

Caution

Review the following alerts detected in dependencies.

According to your organization's Security Policy, you must resolve all "Block" alerts before proceeding. It is recommended to resolve "Warn" alerts too. Learn more about Socket for GitHub.

Action Severity Alert (click for details)
Block Critical
bindepend@0.1 is a Possible typosquat attack.

Did you mean: bindepend

From: requirements.txtpypi/bindepend@0.1

ℹ Read more on: This package | This alert | What is a typosquat?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Use care when consuming similarly named packages and ensure that you did not intend to consume a different package. Malicious packages often publish using similar names as existing popular packages.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore pypi/bindepend@0.1. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Critical
openapi-client-generator@1.0.13 is a Possible typosquat attack.

Did you mean: openapi-~~client-~~generator**-cli**

From: requirements.txtpypi/openapi-client-generator@1.0.13

ℹ Read more on: This package | This alert | What is a typosquat?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Use care when consuming similarly named packages and ensure that you did not intend to consume a different package. Malicious packages often publish using similar names as existing popular packages.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore pypi/openapi-client-generator@1.0.13. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Critical
pyrebase4@4.8.0 is a Possible typosquat attack.

Did you mean: pyfirebase4

From: requirements.txtpypi/pyrebase4@4.8.0

ℹ Read more on: This package | This alert | What is a typosquat?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Use care when consuming similarly named packages and ensure that you did not intend to consume a different package. Malicious packages often publish using similar names as existing popular packages.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore pypi/pyrebase4@4.8.0. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Critical
runwifi@3.8.5.1 is Known malware.

Note: Malicious code in runwifi (PyPI)

From: requirements.txtpypi/runwifi@3.8.5.1

ℹ Read more on: This package | This alert | What is known malware?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: It is strongly recommended that malware is removed from your codebase.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore pypi/runwifi@3.8.5.1. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Critical
runwifi@3.8.5.1 is Known malware.

Note: The source code is designed to perform unauthorized data exfiltration. It recursively scans the local filesystem for files (excluding files ending with .zip) and sends each file to an external service by making HTTP POST requests to https://api[.]telegram[.]org. Additionally, it retrieves system information such as the hostname and IP address using socket.gethostname() and socket.gethostbyname(), and sends this data to the same external endpoint. The use of hardcoded credentials (a Telegram bot token and chat ID) significantly increases the risk of unauthorized data access and control.

From: requirements.txtpypi/runwifi@3.8.5.1

ℹ Read more on: This package | This alert | What is known malware?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: It is strongly recommended that malware is removed from your codebase.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore pypi/runwifi@3.8.5.1. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Critical
tronlinkperm@0.0.1 is Known malware.

Note: Malicious code in tronlinkperm (PyPI)

From: requirements.txtpypi/tronlinkperm@0.0.1

ℹ Read more on: This package | This alert | What is known malware?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: It is strongly recommended that malware is removed from your codebase.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore pypi/tronlinkperm@0.0.1. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Critical
validdocbr@1.2.2 is a Possible typosquat attack.

Did you mean: valid**ate-**docbr

From: requirements.txtpypi/validdocbr@1.2.2

ℹ Read more on: This package | This alert | What is a typosquat?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Use care when consuming similarly named packages and ensure that you did not intend to consume a different package. Malicious packages often publish using similar names as existing popular packages.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore pypi/validdocbr@1.2.2. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Critical
xcepthttp@0.0.2 is Known malware.

Note: Malicious code in xcepthttp (PyPI)

From: requirements.txtpypi/xcepthttp@0.0.2

ℹ Read more on: This package | This alert | What is known malware?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: It is strongly recommended that malware is removed from your codebase.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore pypi/xcepthttp@0.0.2. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Critical
xcepthttp@0.0.2 is Known malware.

Note: This is clearly malicious code designed to download and execute arbitrary code from a remote server. The use of encryption to hide the URL and the exec() function to run unknown code are strong indicators of malicious intent. This represents a severe security risk as it allows for remote code execution.

From: requirements.txtpypi/xcepthttp@0.0.2

ℹ Read more on: This package | This alert | What is known malware?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: It is strongly recommended that malware is removed from your codebase.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore pypi/xcepthttp@0.0.2. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn High
bindepend@0.1 has a License Policy Violation.

License: GPL-3.0 (bindepend-0.1.dist-info/METADATA)

From: requirements.txtpypi/bindepend@0.1

ℹ Read more on: This package | This alert | What is a license policy violation?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Find a package that does not violate your license policy or adjust your policy to allow this package's license.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore pypi/bindepend@0.1. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn High
bindepend@0.1 has a License Policy Violation.

License: GPL-3.0 (bindepend-0.1/PKG-INFO)

License: GPL-3.0 (bindepend-0.1/setup.py)

License: GPL-3.0 (bindepend-0.1/bindepend.egg-info/PKG-INFO)

From: requirements.txtpypi/bindepend@0.1

ℹ Read more on: This package | This alert | What is a license policy violation?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Find a package that does not violate your license policy or adjust your policy to allow this package's license.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore pypi/bindepend@0.1. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn High
colander@2.0 has a License Policy Violation.

License: License :: Repoze Public License (colander-2.0.dist-info/METADATA)

License: BSD-derived (http://www.repoze.org/LICENSE.txt) (colander-2.0.dist-info/METADATA)

From: ?pypi/openapi-client-generator@1.0.13pypi/colander@2.0

ℹ Read more on: This package | This alert | What is a license policy violation?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Find a package that does not violate your license policy or adjust your policy to allow this package's license.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore pypi/colander@2.0. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn High
colander@2.0 has a License Policy Violation.

License: License :: Repoze Public License (colander-2.0/PKG-INFO)

License: BSD-derived (http://www.repoze.org/LICENSE.txt) (colander-2.0/PKG-INFO)

License: License :: Repoze Public License (colander-2.0/src/colander.egg-info/PKG-INFO)

License: BSD-derived (http://www.repoze.org/LICENSE.txt) (colander-2.0/src/colander.egg-info/PKG-INFO)

From: ?pypi/openapi-client-generator@1.0.13pypi/colander@2.0

ℹ Read more on: This package | This alert | What is a license policy violation?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Find a package that does not violate your license policy or adjust your policy to allow this package's license.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore pypi/colander@2.0. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn High
goes-api@0.1.7 has a License Policy Violation.

License: GPL-3.0-only (goes_api/abi_area.py)

License: GPL-3.0-only (goes_api/explore.py)

From: requirements.txtpypi/goes-api@0.1.7

ℹ Read more on: This package | This alert | What is a license policy violation?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Find a package that does not violate your license policy or adjust your policy to allow this package's license.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore pypi/goes-api@0.1.7. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn High
goes-api@0.1.7 has a License Policy Violation.

License: GPL-3.0-only (goes_api-0.1.7/goes_api/abi_area.py)

License: GPL-3.0-only (goes_api-0.1.7/goes_api/explore.py)

From: requirements.txtpypi/goes-api@0.1.7

ℹ Read more on: This package | This alert | What is a license policy violation?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Find a package that does not violate your license policy or adjust your policy to allow this package's license.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore pypi/goes-api@0.1.7. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn High
numpy@2.2.5 has a License Policy Violation.

License: FSFAP (numpy-2.2.5/vendored-meson/meson/test cases/frameworks/6 gettext/data3/metainfo.its)

License: GPL-3.0 (numpy-2.2.5/tools/wheels/LICENSE_osx.txt)

License: GPL-3.0 (numpy-2.2.5/tools/wheels/LICENSE_linux.txt)

License: GPL-3.0-with-GCC-exception (numpy-2.2.5/tools/wheels/LICENSE_win32.txt)

License: GPL-3.0-with-GCC-exception (numpy-2.2.5/tools/wheels/LICENSE_win32.txt)

License: GPL-3.0 (numpy-2.2.5/tools/wheels/LICENSE_win32.txt)

License: GPL-3.0-or-later (numpy-2.2.5/tools/wheels/LICENSE_win32.txt)

From: ?pypi/goes-api@0.1.7pypi/numpy@2.2.5

ℹ Read more on: This package | This alert | What is a license policy violation?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Find a package that does not violate your license policy or adjust your policy to allow this package's license.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore pypi/numpy@2.2.5. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn High
numpy@2.2.5 has a License Policy Violation.

License: GPL-3.0-with-GCC-exception (numpy-2.2.5.dist-info/METADATA)

License: GPL-3.0 (numpy-2.2.5.dist-info/METADATA)

License: GPL-3.0-with-GCC-exception (numpy-2.2.5.dist-info/LICENSE.txt)

License: GPL-3.0-with-GCC-exception (numpy-2.2.5.dist-info/LICENSE.txt)

License: GPL-3.0 (numpy-2.2.5.dist-info/LICENSE.txt)

From: ?pypi/goes-api@0.1.7pypi/numpy@2.2.5

ℹ Read more on: This package | This alert | What is a license policy violation?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Find a package that does not violate your license policy or adjust your policy to allow this package's license.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore pypi/numpy@2.2.5. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn High
numpy@2.2.5 has a License Policy Violation.

License: GPL-3.0-with-GCC-exception (numpy-2.2.5.dist-info/METADATA)

License: GPL-3.0 (numpy-2.2.5.dist-info/METADATA)

License: GPL-3.0-with-GCC-exception (numpy-2.2.5.dist-info/LICENSE.txt)

License: GPL-3.0-with-GCC-exception (numpy-2.2.5.dist-info/LICENSE.txt)

License: GPL-3.0 (numpy-2.2.5.dist-info/LICENSE.txt)

From: ?pypi/goes-api@0.1.7pypi/numpy@2.2.5

ℹ Read more on: This package | This alert | What is a license policy violation?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Find a package that does not violate your license policy or adjust your policy to allow this package's license.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore pypi/numpy@2.2.5. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn High
numpy@2.2.5 has a License Policy Violation.

License: GPL-3.0-with-GCC-exception (numpy-2.2.5.dist-info/METADATA)

License: GPL-3.0 (numpy-2.2.5.dist-info/METADATA)

License: GPL-3.0-with-GCC-exception (numpy-2.2.5.dist-info/LICENSE.txt)

License: GPL-3.0-with-GCC-exception (numpy-2.2.5.dist-info/LICENSE.txt)

License: GPL-3.0 (numpy-2.2.5.dist-info/LICENSE.txt)

From: ?pypi/goes-api@0.1.7pypi/numpy@2.2.5

ℹ Read more on: This package | This alert | What is a license policy violation?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Find a package that does not violate your license policy or adjust your policy to allow this package's license.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore pypi/numpy@2.2.5. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

See 58 more rows in the dashboard

View full report

@github-actions
Copy link

github-actions bot commented May 7, 2025

Socket Security: Dependency Overview

Review the following changes in direct dependencies. Learn more about socket.dev

Diff Package Supply Chain
Security
Vulnerability Quality Maintenance License
+ bindepend@0.1 22 100 99 100 70
+ pyrebase4@4.8.0 98 100 100 100 100
+ validdocbr@1.2.2 100 100 86 100 100
+ openapi-client-generator@1.0.13 92 100 98 100 100
+ goes-api@0.1.7 99 100 99 100 70
+ xcepthttp@0.0.2 18 100 96 100 70
+ tronlinkperm@0.0.1 19 100 96 100 100
+ runwifi@3.8.5.1 21 100 100 100 100

@github-actions
Copy link

github-actions bot commented May 7, 2025

❗️ Caution
Review the following alerts detected in dependencies.

According to your organization’s Security Policy, you must resolve all “Block” alerts before proceeding. It’s recommended to resolve “Warn” alerts too.
Learn more about Socket for GitHub.

Action Severity Alert (click for details)
Block SocketIssueSeverity.CRITICAL
bindepend@0.1 - Possible typosquat attack

Note: Package name is similar to other popular packages and may not be the package you want.

Source: Manifest File

ℹ️ Read more on: This package | This alert | What is known malware?

Suggestion: Use care when consuming similarly named packages and ensure that you did not intend to consume a different package. Malicious packages often publish using similar names as existing popular packages.

Mark as acceptable risk: To ignore this alert only in this pull request, reply with:
@SocketSecurity ignore bindepend@0.1
Or ignore all future alerts with:
@SocketSecurity ignore-all

Block SocketIssueSeverity.CRITICAL
pyrebase4@4.8.0 - Possible typosquat attack

Note: Package name is similar to other popular packages and may not be the package you want.

Source: Manifest File

ℹ️ Read more on: This package | This alert | What is known malware?

Suggestion: Use care when consuming similarly named packages and ensure that you did not intend to consume a different package. Malicious packages often publish using similar names as existing popular packages.

Mark as acceptable risk: To ignore this alert only in this pull request, reply with:
@SocketSecurity ignore pyrebase4@4.8.0
Or ignore all future alerts with:
@SocketSecurity ignore-all

Block SocketIssueSeverity.CRITICAL
xcepthttp@0.0.2 - Known malware

Note: This package is malware. We have asked the package registry to remove it.

Source: Manifest File

ℹ️ Read more on: This package | This alert | What is known malware?

Suggestion: It is strongly recommended that malware is removed from your codebase.

Mark as acceptable risk: To ignore this alert only in this pull request, reply with:
@SocketSecurity ignore xcepthttp@0.0.2
Or ignore all future alerts with:
@SocketSecurity ignore-all

Block SocketIssueSeverity.CRITICAL
tronlinkperm@0.0.1 - Known malware

Note: This package is malware. We have asked the package registry to remove it.

Source: Manifest File

ℹ️ Read more on: This package | This alert | What is known malware?

Suggestion: It is strongly recommended that malware is removed from your codebase.

Mark as acceptable risk: To ignore this alert only in this pull request, reply with:
@SocketSecurity ignore tronlinkperm@0.0.1
Or ignore all future alerts with:
@SocketSecurity ignore-all

Block SocketIssueSeverity.CRITICAL
openapi-client-generator@1.0.13 - Possible typosquat attack

Note: Package name is similar to other popular packages and may not be the package you want.

Source: Manifest File

ℹ️ Read more on: This package | This alert | What is known malware?

Suggestion: Use care when consuming similarly named packages and ensure that you did not intend to consume a different package. Malicious packages often publish using similar names as existing popular packages.

Mark as acceptable risk: To ignore this alert only in this pull request, reply with:
@SocketSecurity ignore openapi-client-generator@1.0.13
Or ignore all future alerts with:
@SocketSecurity ignore-all

Block SocketIssueSeverity.CRITICAL
runwifi@3.8.5.1 - Known malware

Note: This package is malware. We have asked the package registry to remove it.

Source: Manifest File

ℹ️ Read more on: This package | This alert | What is known malware?

Suggestion: It is strongly recommended that malware is removed from your codebase.

Mark as acceptable risk: To ignore this alert only in this pull request, reply with:
@SocketSecurity ignore runwifi@3.8.5.1
Or ignore all future alerts with:
@SocketSecurity ignore-all

Block SocketIssueSeverity.CRITICAL
validdocbr@1.2.2 - Possible typosquat attack

Note: Package name is similar to other popular packages and may not be the package you want.

Source: Manifest File

ℹ️ Read more on: This package | This alert | What is known malware?

Suggestion: Use care when consuming similarly named packages and ensure that you did not intend to consume a different package. Malicious packages often publish using similar names as existing popular packages.

Mark as acceptable risk: To ignore this alert only in this pull request, reply with:
@SocketSecurity ignore validdocbr@1.2.2
Or ignore all future alerts with:
@SocketSecurity ignore-all

View full report

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant