/check-malicious endpoint to send a single GET request with a report_type and a resource_identifier, and the API tells you whether that resource appears in the OSM threat database. The endpoint covers all supported resource types — packages, repositories, URLs, domains, IP addresses, cryptocurrency wallets, and container images — through one unified interface.
Endpoint
Query parameters
The category of resource to check. Accepted values:
package, repository, url, domain, ip, wallet, container.The specific resource to look up. What you pass here depends on the
report_type — for example, a package name, a full repository URL, a domain, an IP address, or a wallet address.For
package and container report types, specify the ecosystem or registry. For packages: npm, pypi, maven, nuget, vscode, skills. For containers: dockerhub, ghcr, quay.For
package report types, the specific version to check. If omitted, the API checks the package across all known versions.Response fields
Malicious resource found
When the resource is in the OSM threat database, the response includes adetails object with the full threat record.
true when the resource is found in the malicious database.The report type you queried (echoed from the request).
The resource identifier you queried (echoed from the request).
The ecosystem, if applicable (echoed from the request).
The number of verified threat reports associated with this resource.
The full threat record for the most relevant verified report.
Resource not found
When the resource is not in the OSM database, the API still returns HTTP200 with "malicious": false.
false when the resource is not found in the malicious database.Echoed from the request.
Echoed from the request.
Echoed from the request, if provided.
A plain-language explanation, e.g.
"Resource not found in malicious database".Report types
package
package
Check packages by name across supported ecosystems: npm, PyPI, Maven, NuGet, VS Code extensions, and AI Skills. Use the
ecosystem parameter to scope the lookup. Use the version parameter to check a specific release.repository
repository
Check GitHub or GitLab repositories linked to malicious activity. The
resource_identifier must be the full repository URL including https://.url
url
Check a specific URL for malicious content — phishing pages, malware delivery endpoints, and similar threats.
domain
domain
Check domains associated with command-and-control (C2) infrastructure, phishing campaigns, or other malicious activity. Pass only the domain, without a protocol or path.
ip
ip
Check IP addresses associated with C2 infrastructure, attack sources, or other malicious network activity.
wallet
wallet
Check cryptocurrency wallet addresses that have been linked to ransomware payments, extortion campaigns, or other attacks.
container
container
Check container images from Docker Hub, GitHub Container Registry (GHCR), or Quay for known malicious payloads such as cryptominers or backdoors. Use the
ecosystem parameter to specify the registry (dockerhub, ghcr, quay).