Use Case · Typosquatting Defense

Block Typosquats At Install Time.

The malicious-package scanner plus on-device Lino inspection stop typosquats before they reach disk — across npm, pypi, maven, gem, and cargo. Similarity match against the popular-package corpus, behaviour heuristics, automatic block, audit trail.

5
Ecosystems Covered
<80 ms
Lino On-Device Verdict
Levenshtein + Embed
Similarity Match
Pre-Disk
Block Stage

A Single Mistyped Letter Owns The Build.

Public registries make name collisions trivial. The pattern is well documented: an attacker registers a package whose name is one letter off from a popular library, ships an install hook that exfiltrates environment variables, and waits for a developer to fat-finger an install command.

Repository-level scans do not catch it; the package is in the lockfile because someone added it deliberately. CVE databases do not catch it; the malicious package is its own artefact, not a vulnerable version of a legitimate one. The right place to intervene is at install time, on the developer's machine, before the install hook runs.

Lino runs locally at install — under 80 ms — checks the package name against a popular-corpus similarity model, inspects the package contents for known malicious patterns, and blocks if it looks like a squat before any post-install script executes.

01

Post-Install Hooks Run Before Review

npm and pypi packages can execute scripts the moment install completes. Network exfiltration starts before the developer even sees the lockfile diff.

02

Name Similarity Is High-Dimensional

Edit distance alone misses unicode-confusable, homoglyph, and scope-prefix attacks. Embedding-space similarity catches the cases that string metrics do not.

03

Ecosystem-Specific Payloads

Maven and gem squats often ship benign source plus a malicious build-time plugin; pypi uses setup.py; npm uses preinstall. Detection must understand each ecosystem&apos;s lifecycle.

04

Visibility Lives In The Wrong Place

Server-side scanning sees the package after install. The right vantage point is the developer&apos;s machine — which is where Lino runs.

What It Does

Block, Inspect, And Log — At Install.

Lino Inline At Install

The on-device Lino hook intercepts every package install across npm / pypi / maven / gem / cargo. Verdict in under 80 ms; no source code or install metadata leaves the machine.

Embedding-Similarity Match

Package names are compared against the popular-corpus embedding plus Levenshtein and homoglyph distance. Suspicious-looking names trip a deeper inspection.

Behavioural Heuristics

Lino inspects manifest scripts, install hooks, and obfuscation patterns flagged by the malicious-package scanner training set. High-confidence squats block by default.

Tenant-Wide Alert Trail

Every block emits a signed event to the tenant audit log with the offending package name, the suspected target, and the developer who attempted the install.

The Pipeline

From `npm install` To Blocked Squat.

01
Install intercept

Lino hook fires on every install attempt; works inline with the package manager — no proxy MITM required.

02
Similarity check

Package name embedded and matched against the popular-corpus index; edit distance + homoglyph distance computed in parallel.

03
Manifest inspection

Install scripts, post-install hooks, and obfuscation heuristics evaluated by the on-device Lino classifier.

04
Verdict + block

If score crosses threshold, the install is blocked before any script runs; otherwise it proceeds with no measurable latency.

05
Tenant audit emit

A signed event is sent to the tenant audit log; high-confidence squats trigger Eagle-led further investigation.

06
Coordinated takedown

Confirmed malicious packages are reported via the registry abuse channels; tenant mirrors blackhole the namespace.

Outcomes You Notice On Day Two.

No Squat Reaches Disk

Block fires before install script
Pre-disk verdict on the dev machine
Five ecosystems covered uniformly

Visibility For Security Teams

Signed audit event per attempt
Heatmap of squat targets per ecosystem
Top-targeted package list per quarter

Coordinated Takedown Path

Registry-abuse report drafted
Tenant mirror blackholes the namespace
Cross-tenant intel feeds the next baseline

See Lino for the on-device runtime, scanner-suite for the malicious-package classifier, and SCA for the dependency graph context.

Stop A Squat Before The Install Hook Fires.

Install the Lino hook on a single dev workstation and we'll replay a known squat against it in the demo.