@volcengine/diagnostics-tls@0.0.6
A heavily obfuscated package published under ByteDance's @volcengine npm scope. The 155KB single .cjs file uses hex variable names, string array rotation, and anti-debugging techniques. It collects API keys, access keys, and secret keys via a zod config schema. Legitimate @volcengine packages do not ship obfuscated code, suggesting possible scope compromise or rogue insider.
@volcengine/diagnostics-tls@0.0.6 is a heavily obfuscated package published under ByteDance's cloud scope. The code is entirely javascript-obfuscated (hex variables, array rotation, anti-debugging), collects API keys/access keys/secret keys via a zod schema, and cannot be audited. Legitimate @volcengine packages do not ship obfuscated code.
const _0x562b54=_0x1b58;(function(_0x6a8bb4,_0x3d4af1){
const _0x5cf6f8=_0x1b58,_0x18244b=_0x6a8bb4();
while(!![]){try{const _0x3b5dbe=-parseInt(_0x5cf6f8(0x27f))/0x1+...
155KB of completely unreadable code with hex-encoded variable names, string array rotation, and parseInt-based control flow.
The openclaw.plugin.json defines a zod config schema that collects:
apiKey — Volcengine API keyak — Access keysk — Secret key@volcengine/* packages (volcengine has 100+ npm packages) ship readable, unobfuscated TypeScript/JavaScriptDetected by: npm-sentinel automated scanner Date: 2026-04-03