Binary evidence
bcrypt_lib.node
Evidence is consistent with an expected native package implementation.
The binary performs native password hashing and seed generation using expected runtime libraries.
Binary detail
Review one native artifact in depth: evidence checklist, surfaced imports and strings, grouped findings, and package-level context for approval decisions.
Binary evidence
Evidence is consistent with an expected native package implementation.
The binary performs native password hashing and seed generation using expected runtime libraries.
Recovered from artifact metadata
Executable/container format
Binary payload size
bcrypt investigation target
EVP_sha512, uv_queue_work, node_module_register
/dev/urandom, Invalid salt version
1int bcrypt_hash(...) { /* native hashing flow */ }Package-level aggregate score
Confidence in decompiled/source alignment
190 KB total analyzed size
Observed across all binaries
Reads system entropy for password hashing.
No action needed.No behaviors or findings detected.
Expected behaviors only. Safe for most environments.
Some review-worthy behaviors. Inspect before deploying in hardened environments.
Multiple risk signals. Manual review required before production use.
Severe risk indicators. Block until validated by a security engineer.
2-45 pts per findingSeverity-weighted: info=2, low=8, medium=18, high=30, critical=45
3-28 pts per detectednetwork=14, filesystem=4, process=12, crypto=3, obfuscation=24, exfiltration=28
Up to 6 ptsimportCount / 4, capped at 6. More imports = larger attack surface.
Up to 5 ptsfunctionCount / 20, capped at 5. Complexity indicator.
Package-level score = 65% highest binary score + 35% average binary score. Scores are deterministic and reproducible.