Replies: 2 comments
-
When a package like lessc-rhino is flagged as malicious and assigned a security advisory (like GHSA-rw3m-xvr5-2gfx), the specific details about what makes the package malicious are often documented in the advisory or its references. Here's how you can investigate further: Steps to Investigate Type of malicious activity (e.g., data exfiltration, credential harvesting). Extract the package and inspect its contents. Compare with a Known Safe Version Use a diff tool to identify unexpected changes. Search Public Threat Reports "lessc-rhino malware analysis." Remediation Recommendations |
Beta Was this translation helpful? Give feedback.
-
do not forget to follow me |
Beta Was this translation helpful? Give feedback.
-
There was a change to lessc-rhino and it is now listed as "Malware in lessc-rhino" with no context on what/where the malicious code was located. Is there a way to see what specifically was flagged as malicious?
"Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it."
GHSA-rw3m-xvr5-2gfx
Beta Was this translation helpful? Give feedback.
All reactions