{
  "schema": "cremit-ioc/v1",
  "generated_at": "2026-05-21T11:04:06.993Z",
  "package": {
    "ecosystem": "npm",
    "name": "crypto-credential-scanner",
    "version": "2.0.2",
    "publisher": "ddjidd5640",
    "sha256": "sha512-48rfOkQsJrjcJBzCLRszHt3l+rwkio0OsB04lZGHKyfuICml/io1341dQBWH8B0L/trqtKZpdMhukWupXM91iQ==",
    "tarball_url": "https://registry.npmjs.org/crypto-credential-scanner/-/crypto-credential-scanner-2.0.2.tgz",
    "weekly_downloads": 161,
    "description": "Detect exposed crypto credentials in project files, git history, logs, and environment configs. Helps prevent private key leaks from reaching production.",
    "repository_url": "https://github.com/cryptosec-guild/credential-scanner",
    "first_published_at": "2026-05-19T03:56:20.358Z"
  },
  "classification": {
    "label": "malicious",
    "confidence": 0.92,
    "summary": "OSV-flagged advisory + install hook (suspicious description) — fast-tracked without LLM.",
    "provider": "fast-track",
    "heuristic_score": 100,
    "disposition": "auto-published"
  },
  "references": {
    "npm_url": "https://www.npmjs.com/package/crypto-credential-scanner/v/2.0.2",
    "pypi_url": null,
    "osv_id": null,
    "osv_url": null,
    "package_page": "https://incidents.cremit.io/packages/npm/crypto-credential-scanner"
  },
  "techniques": [
    {
      "id": "T1033",
      "name": "System Owner/User Discovery",
      "tactic": "Discovery"
    },
    {
      "id": "T1059",
      "name": "Command and Scripting Interpreter",
      "tactic": "Execution"
    },
    {
      "id": "T1082",
      "name": "System Information Discovery",
      "tactic": "Discovery"
    },
    {
      "id": "T1552.001",
      "name": "Unsecured Credentials: Credentials in Files",
      "tactic": "Credential Access"
    },
    {
      "id": "T1552.003",
      "name": "Unsecured Credentials: Bash History",
      "tactic": "Credential Access"
    },
    {
      "id": "T1567.002",
      "name": "Exfiltration Over Web Service",
      "tactic": "Exfiltration"
    }
  ],
  "indicators": {
    "network": {
      "urls": [
        "https://ddjidd564.github.io/defi-security-best-practices/config.json",
        "https://github.com/cryptosec-guild/credential-scanner"
      ],
      "ipv4": [],
      "webhook_bins": [
        {
          "service": "webhook.site",
          "url": "https://webhook.site/8d334534-1c63-4f4f-a0d7-95c446c8b233"
        }
      ],
      "discord_webhook_ids": [],
      "telegram_bots": [],
      "github_repos": [
        "github.com/cryptosec-guild/credential-scanner"
      ]
    },
    "files": {
      "credential_paths": [
        "wallet.dat",
        "metamask"
      ]
    },
    "deps": {
      "suspicious": [
        "axios"
      ]
    },
    "encoded": {
      "base64": []
    },
    "metadata": {
      "heuristic_flags": [
        "install-scripts:postinstall",
        "new-publisher:2d",
        "suspicious-description:leaks",
        "publisher-multi-name-burst:10",
        "publisher-version-pump:13",
        "osv-flagged:MAL-2026-4203"
      ],
      "static_flags": [
        "reads-seed-phrase",
        "reads-homedir",
        "reads-system-info",
        "webhook-bin",
        "reads-env-vars",
        "reads-shell-history",
        "child-process-spawn",
        "reads-npmrc",
        "reads-wallet-files"
      ],
      "self_described_as": [
        "author\": \"Crypto Security Guild\""
      ]
    }
  },
  "stix_hints": {
    "indicator_pattern_examples": [
      "[url:value = 'https://webhook.site/8d334534-1c63-4f4f-a0d7-95c446c8b233']",
      "[file:hashes.'SHA-256' = 'sha512-48rfOkQsJrjcJBzCLRszHt3l+rwkio0OsB04lZGHKyfuICml/io1341dQBWH8B0L/trqtKZpdMhukWupXM91iQ==']"
    ],
    "note": "These are STIX 2.1 indicator pattern fragments, not a full bundle. Wrap each in {type:\"indicator\", pattern:..., pattern_type:\"stix\"} and add identity / created_by_ref objects to ingest into a TIP."
  }
}