SCANNING solana-labs/solana-web3.js...
Solana JavaScript SDK
Attackers compromised a maintainer account and published versions 1.95.6/1.95.7 with key-stealing code targeting Solana private keys. Published for ~5 hours before detection.
Source →This report is generated on demand by querying the GitHub API for repository metadata and published security advisories, then cross-referencing our curated database of known supply-chain incidents (xz-utils, event-stream, ua-parser-js, colors.js, tj-actions, Codecov, and more). Results are cached for 24 hours. We do not scan repository code or dependencies — for that, see Snyk or Socket. Verdict: CLEAN ≥80, CAUTION 50–79, COMPROMISED<50.
Repo looks clean but the live deployment might still be exposing headers, CORS, or SSL misconfigurations.
SCAN A URL →