Audited & minimal JS implementation of elliptic curve cryptography
License: Permissive (MIT)
Published: 2 months ago
Licenses
No license compliance issues
Secrets
No sensitive information found
Vulnerabilities
No known vulnerabilities detected
Hardening
No application hardening issues
Tampering
No evidence of software tampering
Malware
No evidence of malware inclusion
List of software behaviors discovered with static code analysis.
Decodes data using the Base64 algorithm.3packer
Prevalence in npm community
Behavior often found in this community (Common) 175209 packages
in community
Contains URLs that link to interesting file formats.14network
Prevalence in npm community
Behavior often found in this community (Common) 107169 packages
in community
Encodes data using the Base16 algorithm.3file
Prevalence in npm community
Behavior often found in this community (Common) 290629 packages
in community
Executes files during installation or upon launch.1execution
Prevalence in npm community
No behavior prevalence information at this timeContains URLs that use suspicious top-level domains.5network
Prevalence in npm community
Behavior often found in this community (Common) 248804 packages
in community
Might evaluate code dynamically.4anomaly
Prevalence in npm community
Behavior often found in this community (Common) 342917 packages
in community
Contains unusually long strings.9anomaly
Prevalence in npm community
Behavior often found in this community (Common) 4626 packages
in community
Uses cryptographical functions.3packer
Prevalence in npm community
Behavior often found in this community (Common) 36879 packages
in community
Contains URLs related to release pages of projects hosted on GitHub.1network
Prevalence in npm community
Behavior often found in this community (Common) 97150 packages
in community
Converts binary data to its string representation, commonly used in obfuscation.8packer
Prevalence in npm community
Behavior often found in this community (Common) 1056717 packages
in community