Description
Greetings, I see a large influx of similar issues like this so sorry for only on to the pile.
It looks like a private, and only internally used npm
package we have called @ibm-pipeline/logging
is not only published in the public registry, but it is also being flagged as malware.
As far as I can tell, our team had nothing to do with this and it very well could be a bad actor that published the public package of the same name.
However, our local .npmrc
and package-lock.json
files are configured to pull absolutely everything from our private npm registry, so I'm perplexed as to why running npm audit
pulls up the alert for the public package as that isn't what we're installing and not how I understood audit
to work.
Links:
GHSA-g4xx-7vwp-pq9p
https://www.npmjs.com/package/@ibm-pipeline/logging
Output:
harlow$ npm audit
# npm audit report
@ibm-pipeline/logging >0
Severity: critical
Malware in @ibm-pipeline/logging - https://github.com/advisories/GHSA-g4xx-7vwp-pq9p
No fix available
harlow$ npm view @ibm-pipeline/logging
@ibm-pipeline/logging@1.0.14 | UNLICENSED | deps: 3 | versions: 16
logging framework
dist
.tarball: <NOT THE PUBLIC REGISTRY>/@ibm-pipeline/logging-1.0.14.tgz
.shasum: <SHASUM>
.integrity: <SHA>
dependencies:
joi: 17.5.0 nconf: 0.12.0 winston: 3.3.3
dist-tags:
latest: 1.0.14
Is this a false positive, or something we should be concerned about?
I'm especially curious about npm audit
pointing to the public package despite the local configurations.
Thanks in advance for your time.