Required Reading
~5 min

Why NPMScan

Fast, blunt, and practical preflight checks for npm packages.

Why we built NPMScan

Too many teams still npm i blind. Recent npm waves (drainers, typosquats, maintainer takeovers) showed how fast a bad release slips into CI and ships to prod. We wanted a dead-simple preflight check that catches malware now, not just CVEs from last year.

What’s different vs. the usual scanners

  • Active malware intel: live feed of malicious packages/campaigns, not just advisory databases.
  • Drainer & takeover heuristics: flags obfuscated postinstall scripts, suspicious maintainer changes, exfil patterns, clipboard/crypto hooks.
  • Zero setup: paste package.json or enter package@version → instant risk snapshot.
  • Release diffing: highlights risky jumps (new scripts/bins/deps) so you can pin or skip.
  • CI optional: great in-browser; API/CLI if you want gates later.

It’s fast, blunt, and practical. No login, no fluff — just “is this safe to install?” in seconds.

No source code required

If you don’t trust anyone (good instinct), don’t upload your repo — just share package.json.

No installs, no extensions

You don’t need to install anything. Even VS Code extensions can touch env vars or run scripts; NPMScan runs in your browser, read-only.

One-page context you usually click around for

See latest commits, open issues, and maintainer info for each package on a single page. On GitHub you’d bounce between tabs; here it’s consolidated.

Trust but verify

We show the raw facts (commits/issues/maintainers/scripts/diffs) so you can do your own analysis if you don’t want to rely on ours.

Roadmap (tell us what to prioritize)

  • GitHub App PR comments
  • Lockfile diff guard
  • VS Code extension (strictly read-only)
  • Private registry proxy with policy
  • SBOM export + API

We’re a team focused on practical supply‑chain safety. Tell us what would help your workflows most.