// npm package
stripe-internal-utils
Full RCE PoC -osama
versions
1
maintainers
1
first publish
2026-05-19
publisher
dewifewi
tarball
1,026 B
AUTO-PUBLISHED·1 version indexed·latest published 2026-05-19
// exfil path
what is read → where it shipssteals
- ○ home dir
- ○ system info
sends to
- ⇢ wvmjioytxqdcokzvflqjv6v35ug1nfyjl.oast.fun(oast.fun)
- ⚙ dns tunneling(fetches + executes remote payload)
// publisher campaignby dewifewi
2 caught packages from this accountThis is not an isolated catch. The same publisher has shipped 1 other package that our pipeline flagged — the shape of a coordinated campaign, not a one-off. Each link below opens that sibling's analysis.
// offending code· @1.0.0· 1 file flagged
llm: malicious · 0.95→ Sends to suspicious destination(s): wvmjioytxqdcokzvflqjv6v35ug1nfyjl.oast.fun.
- @1.0.0··AUTO-PUBLISHED·publisher: dewifewiheuristic 100/100static flags 6llm malicious (0.95) via ollamainstall-scripts:postinstallnew-publisher:0dfirst-version-of-packagefirst-version-suspicious-publishersuspicious-description:pocpublisher-version-pump:8reads-env-varsreads-homedirreads-system-infodns-tunnelingchild-process-spawndest-via-hostname-var
→ Sends to suspicious destination(s): wvmjioytxqdcokzvflqjv6v35ug1nfyjl.oast.fun.
// NHI intent1 target·
