- Home
- Tools
- Application Security
- Software Composition Analysis
- Audit Node Modules With YARA Rules
Audit Node Modules With YARA Rules
A tool to run YARA rules against node_module folders to identify suspicious scripts

Audit Node Modules With YARA Rules
A tool to run YARA rules against node_module folders to identify suspicious scripts
Audit Node Modules With YARA Rules Description
The purpose of this tool is to run a given set of YARA rules against the given node_module folder. With this approach, We can define YARA rules to identify suspicious scripts which are injected into node packages. Mainly inspired by these articles: Malicious packages in npm, Malicious NPM packages target Amazon, Slack with new dependency attacks, Hunting malicious NPM packages. This package can be added to the CI/CD pipeline. Software Requirements: Docker, Docker Compose, Makefile. How to use: Clone this repo, execute audit operation with `make` command, report available in `artifacts/output.json`.
Audit Node Modules With YARA Rules FAQ
Common questions about Audit Node Modules With YARA Rules including features, pricing, alternatives, and user reviews.
Audit Node Modules With YARA Rules is A tool to run YARA rules against node_module folders to identify suspicious scripts. It is a Application Security solution designed to help security teams with Docker, NPM, YARA.