critical
suspicious.dangerous_exec
- Location
- dist/outbound-payload.test-harness-B8N8U_AA.js:3440
- Finding
- Shell command execution detected (child_process).
- Evidence
const parts = /(.+?)(?::(\d+))?(?::(\d+))?$/.exec(urlLike.replace(/^\(|\)$/g, ""));
AdvisoryAudited by Static analysis on May 20, 2026.
Detected: suspicious.dangerous_exec, suspicious.dynamic_code_execution
const parts = /(.+?)(?::(\d+))?(?::(\d+))?$/.exec(urlLike.replace(/^\(|\)$/g, ""));
new Function("exports", snapshotContents)(data);