# OSS Security Feed

The OSS Security Feed is an open intelligence resource that tracks compromised or suspicious npm package releases and maintainers in a single, searchable interface. It gives developers and security teams a real-time view of malicious packages before those packages reach their pipelines or developer machines.

### What It Shows

<figure><img src="https://754495266-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FQJRZY4cfEeY3I7DXTOCp%2Fuploads%2FPDFFtrwrPfHBYEXEoFGm%2FScreenshot%202026-03-10%20at%2012.00.38.png?alt=media&#x26;token=952695fb-8b9a-463e-aac4-f4dc49dbb68e" alt=""><figcaption></figcaption></figure>

Each entry in the feed represents a package version that StepSecurity has analyzed and flagged. For every entry, you can see:

* **Package name and version** — the exact release that was assessed
* **Risk level** — either `Critical Risk` or `Safe`, derived from automated analysis
* **Detection summary** — a plain-language description of what the package does and why it was flagged
* **Behavior tags** — labels such as `install-script`, `obfuscated-code`, `typosquatting`, `credential-theft`, and `remote-code-execution` that categorize the threat type at a glance
* **Time of detection** — how recently the package was flagged

### Risk Levels

| Level             | Meaning                                                                                                                    |
| ----------------- | -------------------------------------------------------------------------------------------------------------------------- |
| **Critical Risk** | The package is definitively malicious or contains behavior strongly consistent with a supply chain attack. Do not install. |
| **Safe**          | The package was analyzed and no malicious behavior was detected at the time of assessment.                                 |

{% hint style="info" %}
Risk assessments reflect conditions at the time of analysis. A `Safe` rating for an older version does not guarantee the current version is safe.
{% endhint %}

### Reading an Analysis Report

Clicking any feed entry opens a full analysis report. Here is what each section means.

<figure><img src="https://754495266-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FQJRZY4cfEeY3I7DXTOCp%2Fuploads%2FuOQdsrGZP6qL3sRvQ8Co%2FScreenshot%202026-03-10%20at%2012.14.40.png?alt=media&#x26;token=f127fc90-591f-422c-950e-ac42ec7371e5" alt=""><figcaption></figcaption></figure>

#### Header

Shows the package name, version, registry, risk score, and scan timestamp. A score of **0.0** indicates a definitively malicious package with no redeeming characteristics.

#### AI Verdict

A concise conclusion from StepSecurity's analysis engine covering the attack technique, likely intent, and recommendation. A status of **rejected** means the package failed analysis and poses immediate risk. When paired with **critical** severity, the threat is confirmed rather than suspected.

#### Package Summary

Describes what the package claims to be versus what it actually does, and identifies the primary use case. For malicious packages, this section will explicitly state there is no legitimate use case and explain the deception mechanism used.

#### Suspicious Flags

Categorical tags summarizing detected behaviors. Common flags include:

| Flag                    | What it means                                                   |
| ----------------------- | --------------------------------------------------------------- |
| `install-script`        | Code runs automatically during `npm install`                    |
| `obfuscated-code`       | Source is deliberately obscured to hide behavior                |
| `typosquatting`         | Package name mimics a popular legitimate package                |
| `hidden-functionality`  | Package performs undocumented actions                           |
| `remote-code-execution` | Code is fetched from external URLs and executed at runtime      |
| `credential-theft`      | Targets secrets, tokens, keys, or environment variables         |
| `binary-replacement`    | A legitimate system binary is replaced with a malicious wrapper |

#### Findings

For `Safe` packages, this section is replaced by a **No security findings** notice, confirming that no malicious behavior was detected for that version. The AI Verdict will show **Recommended** and the score will be high (e.g., 9.5/10).

For flagged packages, this is the most detailed section of the report. Each finding includes:

* **Severity** — `critical`, `high`, or `medium`
* **Finding type** — a short classifier such as `obfuscation` or `install-script-exec`
* **Description and impact** — what was found and what could happen if the package is installed
* **Code snippet** — the exact file and line that triggered the finding
* **CWE reference** — the relevant Common Weakness Enumeration identifier
* **Remediation** — the recommended action

A single package may have multiple findings at different severity levels.

### Acting on a Critical Risk Finding

If a package in your dependency tree appears in the feed with a `Critical Risk` rating follow the [Responding to a Compromised npm Package guide](https://docs.stepsecurity.io/guides/how-to-respond-to-a-compromised-npm-package-in-your-organization) for a full incident response walkthrough.
