An extensible, heuristic-based vulnerability scanning tool for installed npm packages. WARNING: npm-scan is still very much in early development and should not be used in production. We are developing more accurate heuristics. We are actively seeking new contributors with ideas for additional heuristics, so please do get in touch :) Another important project you can contribute to is npm-zoo, where past malicious packages are uploaded for research. We need more examples in order to develop better heuristics. Quickstart: npm install https://github.com/spaceraccoon/npm-scan.git npx npm-scan Usage: Usage: npx npm-scan [options] Options: -V, --version output the version number -p, --packages-dir <dir path> set directory path for packages. defaults to node_modules -e, --exclude-heuristics <items> exclude comma-separated list of heuristics -o, --output <file path> set file path for JSON output -v, --verbose print more details for each package scan -s, --strict include low-risk heuristics -h, --help output usage information Developing: git clone https://github.com/spaceraccoon/npm-scan.git npm link npm run scan npm run test npm run lint Push changes on a separate branch. To add a new
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
All-in-one vulnerability intelligence platform for prioritizing remediation efforts and driving security strategies.
Web inventory tool that captures screenshots of webpages and includes additional features for enhanced usability.
Crt.sh is a website that allows users to search for SSL/TLS certificates of a targeted domain, providing transparency into certificate logs.
Simple script to check a domain's email protections and identify vulnerabilities.
An OSINT tool that generates username lists for companies on LinkedIn for social engineering attacks or security testing purposes.
A fully customizable, offensive security reporting solution for pentesters, red teamers, and other security professionals.
FullHunt is a next-generation attack surface security platform that enables companies to discover, monitor, and secure their external attack surfaces.