{
  "schema": "cremit-ioc/v1",
  "generated_at": "2026-05-20T07:50:39.386Z",
  "package": {
    "ecosystem": "npm",
    "name": "@antv/gatsby-theme",
    "version": "0.1.0",
    "publisher": "afc163",
    "sha256": "sha512-RZnzQxDi///Lu4LURa++cPXnyga3RhLN1jR1jMc9r7JRPgauvAk2GuGsofrAHI4LxQ2cv72DyZSKvm6Mjp4LNQ==",
    "tarball_url": "https://registry.npmjs.org/@antv/gatsby-theme/-/gatsby-theme-0.1.0.tgz",
    "weekly_downloads": null,
    "description": "Ant Visualization solution home page",
    "repository_url": "https://github.com/antvis/antvis.github.io",
    "first_published_at": "2019-10-10T07:39:48.450Z"
  },
  "classification": {
    "label": "benign",
    "confidence": 0.85,
    "summary": "No suspicious destination, no remote-exec shape — 2 known-vendor host(s).",
    "provider": "ollama",
    "heuristic_score": 75,
    "disposition": "auto-published"
  },
  "references": {
    "npm_url": "https://www.npmjs.com/package/@antv/gatsby-theme/v/0.1.0",
    "pypi_url": null,
    "osv_id": null,
    "osv_url": null,
    "package_page": "https://incidents.cremit.io/packages/npm/%40antv%2Fgatsby-theme"
  },
  "techniques": [
    {
      "id": "T1567.002",
      "name": "Exfiltration Over Web Service",
      "tactic": "Exfiltration"
    }
  ],
  "indicators": {
    "network": {
      "urls": [
        "https://antvis.github.io",
        "https://github.com/antvis/antvis.github.io",
        "https://github.com/antvis/antvis.github.io/issues",
        "https://www.gatsbyjs.org/docs/browser-apis/",
        "https://prettier.io/docs/en/options.html"
      ],
      "ipv4": [],
      "webhook_bins": [],
      "discord_webhook_ids": [],
      "telegram_bots": [],
      "github_repos": [
        "github.com/antvis/antvis"
      ]
    },
    "files": {
      "credential_paths": []
    },
    "deps": {
      "suspicious": [
        "babel-jest",
        "babel-preset-gatsby",
        "classnames",
        "gatsby",
        "gatsby-image",
        "gatsby-plugin-antd",
        "gatsby-plugin-catch-links",
        "gatsby-plugin-google-analytics",
        "gatsby-plugin-i18n",
        "gatsby-plugin-less",
        "gatsby-plugin-manifest",
        "gatsby-plugin-nprogress",
        "gatsby-plugin-offline",
        "gatsby-plugin-react-helmet",
        "gatsby-plugin-remove-trailing-slashes",
        "gatsby-plugin-sharp",
        "gatsby-plugin-typescript"
      ]
    },
    "encoded": {
      "base64": []
    },
    "metadata": {
      "heuristic_flags": [
        "first-version-of-package",
        "osv-flagged:MAL-2026-3998"
      ],
      "static_flags": [
        "public-github-push"
      ],
      "self_described_as": [
        "author\": \"AntV Team <antv@antfin.com>\""
      ]
    }
  },
  "stix_hints": {
    "indicator_pattern_examples": [
      "[file:hashes.'SHA-256' = 'sha512-RZnzQxDi///Lu4LURa++cPXnyga3RhLN1jR1jMc9r7JRPgauvAk2GuGsofrAHI4LxQ2cv72DyZSKvm6Mjp4LNQ==']"
    ],
    "note": "These are STIX 2.1 indicator pattern fragments, not a full bundle. Wrap each in {type:\"indicator\", pattern:..., pattern_type:\"stix\"} and add identity / created_by_ref objects to ingest into a TIP."
  }
}