npm
bcrypt@5.1.0
Standard bcrypt native addon with entropy access and no suspicious network activity.
Package-level aggregate score
Confidence in decompiled/source alignment
190 KB total analyzed size
Observed across all binaries
Package detail
Treat this as an investigation surface: start with package posture, then inspect binary evidence, finding clusters, and version drift before approving rollout.
npm
Standard bcrypt native addon with entropy access and no suspicious network activity.
Package-level aggregate score
Confidence in decompiled/source alignment
190 KB total analyzed size
Observed across all binaries
low severity posture
Native artifacts recovered
Source/decompile alignment
Combined binary payload
The current evidence set is dominated by expected native behavior.
Not every native artifact in a package deserves equal attention. Focus review where findings cluster.
Use the model summary as triage guidance, then validate against imports, strings, and recovered functions.
This version introduces additional behavior that deserves security review.
Version 5.1.7 adds stricter extension loading checks and a slightly larger native payload.
Reads system entropy for password hashing.
No action needed.x86_64 • ELF • 190 KB
Evidence is consistent with an expected native package implementation.
The binary performs native password hashing and seed generation using expected runtime libraries.
1int bcrypt_hash(...) { /* native hashing flow */ }EVP_sha512, uv_queue_work, node_module_register
/dev/urandom, Invalid salt version
Reads system entropy for password hashing.
No action needed.No related packages surfaced from the current dataset.
No behaviors or findings detected.
Expected behaviors only. Safe for most environments.
Some review-worthy behaviors. Inspect before deploying in hardened environments.
Multiple risk signals. Manual review required before production use.
Severe risk indicators. Block until validated by a security engineer.
2-45 pts per findingSeverity-weighted: info=2, low=8, medium=18, high=30, critical=45
3-28 pts per detectednetwork=14, filesystem=4, process=12, crypto=3, obfuscation=24, exfiltration=28
Up to 6 ptsimportCount / 4, capped at 6. More imports = larger attack surface.
Up to 5 ptsfunctionCount / 20, capped at 5. Complexity indicator.
Package-level score = 65% highest binary score + 35% average binary score. Scores are deterministic and reproducible.