{"schema_version":"1.7.3","id":"MAL-2026-463","published":"2026-01-22T12:17:58Z","modified":"2026-01-23T01:56:59.005502Z","summary":"Malicious code in corporate-blocking (npm)","details":"\n---\n_-= Per source details. Do not edit below this line.=-_\n\n## Source: amazon-inspector (a096b32dfa76f7e64480d72862c34ec7e644ac03db51ad09af0eb1f929d637a1)\nThe package corporate-blocking was found to contain malicious code.\n\n## Source: ossf-package-analysis (fc6d759e06456e2ac7013ed6a7a36afea9e7a21ab6dc117937c5dd0d96b8d993)\nThe OpenSSF Package Analysis project identified 'corporate-blocking' @ 2.99.99 (npm) as malicious.\n\nIt is considered malicious because:\n\n- The package communicates with a domain associated with malicious activity.\n\n- The package executes one or more commands associated with malicious behavior.\n","affected":[{"package":{"name":"corporate-blocking","ecosystem":"npm","purl":"pkg:npm/corporate-blocking"},"versions":["2.99.99"],"database_specific":{"source":"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/npm/corporate-blocking/MAL-2026-463.json"}}],"database_specific":{"malicious-packages-origins":[{"import_time":"2026-01-22T12:48:35.329043204Z","modified_time":"2026-01-22T12:17:58Z","sha256":"fc6d759e06456e2ac7013ed6a7a36afea9e7a21ab6dc117937c5dd0d96b8d993","source":"ossf-package-analysis","versions":["2.99.99"]},{"import_time":"2026-01-23T01:36:50.85366761Z","modified_time":"2026-01-23T01:13:12Z","sha256":"a096b32dfa76f7e64480d72862c34ec7e644ac03db51ad09af0eb1f929d637a1","source":"amazon-inspector","versions":["2.99.99"]}]},"credits":[{"name":"Amazon Inspector","contact":["actran@amazon.com"],"type":"FINDER"},{"name":"OpenSSF: Package Analysis","contact":["https://github.com/ossf/package-analysis","https://openssf.slack.com/channels/package_analysis"],"type":"FINDER"}]}