curl command to query the database — all in under 5 minutes.
Create an account
Go to opensourcemalware.com/auth and sign in with your GitHub account or email address.Your profile tracks your API usage and any threat reports you contribute to the community. Verified reports you submit count toward your community reputation.
Generate an API token
After signing in, go to your profile settings and generate a new API token. All OSM tokens use the
osm_ prefix — for example, osm_your_token.Keep your token somewhere safe. You’ll pass it in the Authorization header of every API request.Make your first threat check
Use the When a match is found in the database, the response tells you the severity, a description of the threat, and any associated tags:If the resource is not in the OSM database,
check-malicious endpoint to query a resource against the OSM database. The example below checks an npm package named malicious-pkg:malicious is false and the response includes a message field:Next steps
- Read the authentication guide to understand token management and rate limits.
- Explore the API reference for all available endpoints, including querying the latest threats and submitting reports.