baileys-kawe@1.0.6
A malicious fork of the popular Baileys WhatsApp Web API library. The attacker cloned the legitimate package and injected an 86KB obfuscated JavaScript payload at lib/Signal/Group/index/_internal.js — a path that closely mimics the real Baileys Signal protocol directory structure. This technique makes the malicious file appear to be part of the legitimate library during casual code review. The obfuscated payload executes on require.
Trojanized fork of the popular Baileys WhatsApp Web API library. Contains an 86KB obfuscated payload hidden at a path that mimics the legitimate Baileys directory structure.
The malicious code is injected at lib/Signal/Group/index/_internal.js — a path designed to look like part of Baileys' legitimate Signal protocol implementation. The real Baileys library has files under lib/Signal/ making this addition blend in during casual review.
The payload is 86KB of javascript-obfuscator output with:
_0x pattern)This is a classic trojanized fork attack — the attacker clones a popular package, adds a malicious payload in a location that mimics the original directory structure, and publishes under a similar name. Developers who install baileys-kawe instead of @whiskeysockets/baileys get a functionally identical library with a hidden backdoor.
baileys-kawe@1.0.6lib/Signal/Group/index/_internal.js (86KB obfuscated)_0x variable naming (javascript-obfuscator)Detected by: npm-sentinel automated scanner Verified by: manual code review Date: 2026-04-03