pre-post-token-vulnerability@0.0.4 vulnerabilities

This package is intended to demonstrate the leaking of secrets using pre- and postevent data.

Direct Vulnerabilities

Known vulnerabilities in the pre-post-token-vulnerability package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • C
Malicious Package

pre-post-token-vulnerability is a malicious package. The package's name is based on existing repositories, namespaces, or components used by popular companies in an effort to trick employees into downloading it, also known as 'dependency confusion'. Therefore, you're only vulnerable if this package was installed from the public NPM registry rather than your private registry.

Note: This malicious package was uncovered by one of Snyk's automated algorithms, and was confirmed to contain malicious code by our Security Research Team. For more context, please visit our blogpost.

How to fix Malicious Package?

Avoid using all malicious instances of the pre-post-token-vulnerability package.

=0.0.1 =0.0.2 =0.0.3 =0.0.4