@veracity/scan-hulud
v1.0.2
Published
Find Shai-Hulud worm in lock files
Maintainers
Readme
scan-hulud
CLI helper that scans a JavaScript lockfile (npm, yarn, or pnpm) for specific package versions listed in affected-packages.txt. The tool is published as @veracity/scan-hulud so it can run directly via npx without installing anything globally.
Why is it published under the @veracity org? I had to act quickly and that was the easiest for me.
Usage (via npx)
npx -y @veracity/scan-hulud@latest ./path/to/package-lock.jsonnpx -y @veracity/scan-hulud@latest ./path/to/yarn.locknpx -y @veracity/scan-hulud@latest ./path/to/pnpm-lock.yamlFlags & arguments
| Flag | Description |
| -------------- | ------------------------------------------------------------------------------------------------------ |
| -y, --yes | Currently ignored, but reserved to keep parity with earlier scripts. |
| -h, --help | Prints usage info. |
| <lock-file> | Required positional argument pointing to a package-lock.json, yarn.lock, or pnpm-lock.yaml file. |
The command prints every package/version pair from affected-packages.txt that also appears in your lockfile. Exit code 0 indicates the scan completed successfully; 1 indicates a failure (for example, at least one vulnerable entry was found or the lockfile could not be read).
Examples
# Scan the default npm lockfile in the current project
npx @veracity/scan-hulud@latest ./package-lock.json
# Scan a pnpm project from anywhere
npx @veracity/scan-hulud@latest ../another-project/pnpm-lock.yaml💡
npxautomatically downloads the CLI from npm on demand. No local install is necessary.
Contributing
This repo intentionally avoids external dependencies—everything relies on Node's built‑in modules so the CLI stays lightweight and reproducible.
Updating affected-packages.txt
Edit affected-packages.txt manually. This is clearly the next step to automate, based on the content on https://helixguard.ai/blog/malicious-sha1hulud-2025-11-24.
Running tests
Use Node's built-in test runner:
npm test
# or
node --testThe tests execute the CLI against curated safe/vulnerable fixtures to ensure regressions are caught.
Submitting changes
- Ensure
affected-packages.txtonly lists onepackage@versionper line. - Run the tests (
npm test). - Open a PR describing the changes and any notable scan results.
That's it—thanks for keeping the scanner up to date!
