/submit-threat endpoint lets you submit threat reports programmatically without using the OSM web interface. This is useful for automating your reporting workflow — for example, when your internal tooling detects a suspicious package and you want to flag it to the OSM community immediately. Submitted reports enter the community verification process and are only published after passing review.
Endpoint
Request body
Send a JSON body with the following fields:The category of resource you are reporting. Accepted values:
package, repository, url, domain, ip, wallet, container.The identifier for the resource — for example, a package name, a full repository URL (including
https://), a domain, an IP address, or a wallet address.For
package report types, the package registry: npm, pypi, maven, nuget, vscode, skills. For container report types: dockerhub, ghcr, quay.A clear description of the threat behavior. Explain what the resource does and why it is malicious. The more specific and evidence-backed your description, the faster the verification process.
Your assessment of the threat severity. Accepted values:
critical, high, medium, low, informational. If omitted, the verification team will assign a severity during review.An array of category tags that describe the threat behavior, for example:
["infostealer", "supply-chain"]. Tags help with filtering and discovery.An array of URLs pointing to supporting evidence — blog posts, security advisories, GitHub issues, VirusTotal reports, and similar sources. Strong evidence accelerates verification.
The specific version or version range affected, if applicable. For example:
"1.2.3", ">=1.0.0 <2.0.0", or "all".cURL example
Success response
A successful submission returns HTTP200 with a confirmation object including the new report’s ID:
Submitted reports go through the OSM community verification process before they are published to the database. This review ensures data quality and prevents false positives. You can track the status of your submissions from your profile on opensourcemalware.com.