@mathiscode/codebase-scanner
v1.1.1
Published
Scan a codebase for malware signatures
Downloads
39
Maintainers
Readme
Codebase Scanner
A quick and dirty tool to help defend against common developer-focused malware campaigns since many of these go unnoticed by common antivirus software.
When a signature is found, the filename is printed to the console and optionally fixed (if --fix
is passed). When fixing, a header is prepended to the file to prevent the malware from running or being imported. This may not be foolproof, so always exercise caution and do everything possible to avoid letting the codebase run any scripts.
Inspired by this experience (obfuscated Javascript steals your browser profiles and other files via a "test task" on freelancing sites, hidden within a seemingly innocuous codebase).
Currently the signatures only target this specific type of Javascript malware, but more will be added over time. Signatures may be added for other file types as well.
PRs welcome!
Have you found a new signature? Please submit a PR with the signature added to signatures.js
and a sample file attached in a comment.
Usage
Scan a repository in a Docker container:
docker run -it --rm mathiscode/codebase-scanner:latest
# Enter the repo url: https://github.com/owner/repo
# ☠️ Found signature Obfuscated Javascript (Buffered "child_process") in file /path/to/codebase/malware.js
Scan a local codebase:
# Just scan
npx @mathiscode/codebase-scanner@latest /path/to/codebase
# ☠️ Found signature Obfuscated Javascript (Buffered "child_process") in file /path/to/codebase/malware.js
# Scan and fix
npx @mathiscode/codebase-scanner@latest --fix /path/to/codebase
# ☠️ Found signature Obfuscated Javascript (Buffered "child_process") in file /path/to/codebase/malware.js
# ✅ Fixed file /path/to/codebase/malware.js
Malicious File Header
When a file is fixed, the following header is prepended to the file: