⚠️ CRITICAL SECURITY ALERT - ACTIVE MALWARE DISTRIBUTION
AgentAudit Security Audit Report
| Metric |
Value |
| Package |
Muhaastok--DBJavaGenix |
| Risk Score |
100/100 |
| Result |
🔴 UNSAFE - ACTIVE MALWARE |
| Findings |
5 total (3 critical, 2 high) |
| Scan Date |
2026-02-10 |
🚨 IMMEDIATE ACTION REQUIRED
This repository is actively distributing Windows malware disguised as a Java code generation tool. Users who have downloaded and executed the DBJavaGenix.zip file should assume their systems are compromised.
Critical Findings Summary
🔴 CRITICAL - Malicious Windows Executable Payload
Pattern: DESTRUCT_001 | File: rubytail/DBJavaGenix.zip
The repository contains a malware dropper ZIP file with:
- luajit.exe (LuaJIT interpreter, 101KB)
- lua51.dll (Lua runtime, 3.5MB)
- Launch.cmd (batch script that executes luajit.exe)
- include.lib (329KB obfuscated Lua script with base64-encoded payload)
These executables have nothing to do with Java development and represent active malware.
🔴 CRITICAL - Heavily Obfuscated Lua Payload
Pattern: OBF_B64_002 | File: rubytail/DBJavaGenix.zip -> include.lib
The include.lib file contains:
- Multiple layers of base64 encoding
- Octal-encoded strings (
\108\097\048\103...)
- Obfuscation patterns consistent with info-stealers, RATs, or ransomware
Sample encoded content:
local m={"\108\097\048\103\081\066\061\061";"\068\053\113\107\119\072\073..."}
🔴 CRITICAL - Social Engineering via README
Pattern: SOCIAL_ENG_001 | File: README.md
The README.md file is a sophisticated social engineering attack:
- Presents fake "installation instructions" that actually guide users to download malware
- All links (Releases, User Guide, Community Forum) point to the malicious ZIP file
- Uses legitimate-looking documentation to build false trust
- Provides detailed steps on how to extract and execute the malware
🟠 HIGH - Repository Ownership Mismatch (Supply Chain Attack)
Pattern: SOCIAL_ENG_002 | Files: Multiple
Critical discrepancy detected:
- README.md references:
Muhaastok/DBJavaGenix (this malicious repository)
- pyproject.toml & package.json reference:
ZhaoXingPeng/DBJavaGenix (potentially legitimate)
Analysis: This suggests either:
- A malicious fork distributing malware under a similar name, OR
- The legitimate repository was compromised and had malware injected
This is a supply chain attack targeting users of the DBJavaGenix project.
🟠 HIGH - Misleading Documentation Conceals Malware
Pattern: SOCIAL_ENG_003 | File: README.md
The README appears as legitimate software documentation with:
- System requirements
- Installation instructions
- Usage guides
- FAQ section
But every link downloads the same malware payload, creating false legitimacy to maximize infection rates.
Impact Assessment
If you downloaded and executed DBJavaGenix.zip:
- ⚠️ Assume your system is compromised
- 🔌 Disconnect from network immediately
- 🛡️ Run full offline antivirus scan
- 🔍 Check for persistence mechanisms:
- Windows startup folder
- Registry Run keys
- Scheduled tasks
- Service installations
- 👁️ Monitor for:
- Unauthorized file access
- Network connections to unknown IPs
- Cryptocurrency wallet theft
- Credential theft
- Keylogging activity
- 🔐 Change all passwords (from a clean device)
- 📞 Consider professional incident response if sensitive data is at risk
Recommended Actions for Repository Owner
If you are ZhaoXingPeng (legitimate owner):
- This repository appears to be a malicious fork - report it to GitHub Security
- Verify your GitHub account has not been compromised
- Enable 2FA if not already active
- Review all recent commits for unauthorized changes
If you are Muhaastok:
- Remove the
rubytail/ directory and all malware immediately
- Rewrite README.md to remove all malware distribution links
- Explain to users why this malware was present
- Issue security advisory to anyone who may have downloaded the file
Full Report
View the complete audit report with detailed evidence and remediation guidance:
🔗 AgentAudit Report
Report ID: ASF-2026-0526 through ASF-2026-0530
Response Required
Please respond to this issue with:
- Confirmation that malware has been removed
- Explanation of how it entered the repository
- Timeline of compromise (if account was hacked)
- Security measures taken to prevent recurrence
This audit was performed automatically by AgentAudit, the security registry for AI agent packages. Report generated: 2026-02-10
If you believe any finding is incorrect, you can dispute it on the AgentAudit platform. However, the presence of Windows executables in this repository is factually verified.
AgentAudit Security Audit Report
Muhaastok--DBJavaGenix🚨 IMMEDIATE ACTION REQUIRED
This repository is actively distributing Windows malware disguised as a Java code generation tool. Users who have downloaded and executed the DBJavaGenix.zip file should assume their systems are compromised.
Critical Findings Summary
🔴 CRITICAL - Malicious Windows Executable Payload
Pattern:
DESTRUCT_001| File:rubytail/DBJavaGenix.zipThe repository contains a malware dropper ZIP file with:
These executables have nothing to do with Java development and represent active malware.
🔴 CRITICAL - Heavily Obfuscated Lua Payload
Pattern:
OBF_B64_002| File:rubytail/DBJavaGenix.zip -> include.libThe include.lib file contains:
\108\097\048\103...)Sample encoded content:
🔴 CRITICAL - Social Engineering via README
Pattern:
SOCIAL_ENG_001| File:README.mdThe README.md file is a sophisticated social engineering attack:
🟠 HIGH - Repository Ownership Mismatch (Supply Chain Attack)
Pattern:
SOCIAL_ENG_002| Files: MultipleCritical discrepancy detected:
Muhaastok/DBJavaGenix(this malicious repository)ZhaoXingPeng/DBJavaGenix(potentially legitimate)Analysis: This suggests either:
This is a supply chain attack targeting users of the DBJavaGenix project.
🟠 HIGH - Misleading Documentation Conceals Malware
Pattern:
SOCIAL_ENG_003| File:README.mdThe README appears as legitimate software documentation with:
But every link downloads the same malware payload, creating false legitimacy to maximize infection rates.
Impact Assessment
If you downloaded and executed DBJavaGenix.zip:
Recommended Actions for Repository Owner
If you are ZhaoXingPeng (legitimate owner):
If you are Muhaastok:
rubytail/directory and all malware immediatelyFull Report
View the complete audit report with detailed evidence and remediation guidance:
🔗 AgentAudit Report
Report ID: ASF-2026-0526 through ASF-2026-0530
Response Required
Please respond to this issue with:
This audit was performed automatically by AgentAudit, the security registry for AI agent packages. Report generated: 2026-02-10
If you believe any finding is incorrect, you can dispute it on the AgentAudit platform. However, the presence of Windows executables in this repository is factually verified.