Skip to content

Conversation

@secbajor
Copy link

@secbajor secbajor commented Apr 1, 2025

No description provided.

@vercel
Copy link

vercel bot commented Apr 1, 2025

@diterra-code is attempting to deploy a commit to the bleu Team on Vercel.

A member of the Team first needs to authorize it.

@socket-security
Copy link

Caution

Review the following alerts detected in dependencies.

According to your organization's Security Policy, you must resolve all "Block" alerts before proceeding. It is recommended to resolve "Warn" alerts too. Learn more about Socket for GitHub.

Action Severity Alert  (click "▶" to expand/collapse)
Block Critical
simple-swizzle@0.2.3 is Known malware.

Note: This code is malicious. It intercepts fetch and XMLHttpRequest responses in the browser, scans for cryptocurrency addresses using many regexes, and replaces detected recipient addresses with attacker-controlled addresses or nearest matches from attacker lists. That behavior is consistent with a crypto wallet/address replacement trojan intended to steal funds. The presence of a seemingly normal utility (swizzle) after the malicious injector suggests a trojanized package where malicious code is prepended to legitimate code. Do not use this package; treat it as compromised and remove/rollback any deployments that included it.

From: ?npm/next@15.1.7npm/simple-swizzle@0.2.3

ℹ Read more on: This package | This alert | What is known malware?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: It is strongly recommended that malware is removed from your codebase.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/simple-swizzle@0.2.3. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Warn High
simple-swizzle@0.2.3 has Obfuscated code.

Confidence: 1.00

Location: Package overview

From: ?npm/next@15.1.7npm/simple-swizzle@0.2.3

ℹ Read more on: This package | This alert | What is obfuscated code?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Packages should not obfuscate their code. Consider not using packages with obfuscated code.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/simple-swizzle@0.2.3. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

View full report

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants