@cnrai/pave@0.5.28
Ships a single 34MB JavaScript file with anti-debugging console hijacking (overwrites console.log/warn/error/trace), hex-indexed string lookups, and array rotation obfuscation. Despite claiming to be an AI agent framework, the extreme obfuscation and anti-analysis techniques make the code impossible to audit. Legitimate AI agent frameworks are typically 50-500KB, not 34MB.
@cnrai/pave@0.5.28 ships a single 34MB JavaScript file with anti-debugging console hijacking, hex-indexed string lookups, and array rotation obfuscation. Despite claiming to be an "AI agent framework", the extreme obfuscation and anti-analysis techniques make the code impossible to audit.
pave.js — 34,031,472 bytes (34MB single file!)
sandbox/SandboxRunner.js — 115,781 bytes
sandbox/permission.js — 47,263 bytes
sandbox/pave-run.js — 18,162 bytes
sandbox/utils/yaml.js — 2,832 bytes
Opus analysis confirmed: a0a/a0b pattern overwrites console.log/warn/error/trace to suppress analysis output. This is a deliberate anti-debugging technique — the code actively prevents security researchers from analyzing it.
Legitimate AI agent frameworks (langchain, autogen, crewai) are 50-500KB. A 34MB single JavaScript file with anti-debugging suggests either:
The repository exists and the maintainer email appears corporate (candrholdings.com). However:
Detected by: npm-sentinel automated scanner Date: 2026-04-03