Huge News!Announcing our $40M Series B led by Abstract Ventures.Learn More
Socket
Sign inDemoInstall
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub AppBook a Demo

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery


timmywil published 3.7.1

left-pad


stevemao published 1.3.0

react


react-bot published 19.0.0

We protect you from vulnerable and malicious packages

tencent-js-sdk

20.1.3

by paulisusu

Removed from npm

Blocked by Socket

This script is attempting to ping a remote host, which could be a sign of data exfiltration or communication with a malicious server. This behavior raises security concerns.

Live on npm for 20 minutes before removal. Socket users were protected even while the package was live.

@zitterorg/laudantium-rerum

2.3.37

by loandinhb931

Live on npm

Blocked by Socket

Malicious code in @zitterorg/laudantium-rerum (npm) Source: ghsa-malware (e45ff91dd83cc149d7abc8c6fb2c74e3509aa341e23c72cfac0a34868a4e2637) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.

ucs-multi-series-line-chart

1.99.99

Removed from npm

Blocked by Socket

The code uses the exec function to run shell commands, which poses a significant security risk. It could potentially execute malicious code if the input to exec is manipulated. Redirecting output to /dev/null to hide execution details is suspicious.

Live on npm for 1 minute before removal. Socket users were protected even while the package was live.

azure-graphrbac

2.5.6

Removed from npm

Blocked by Socket

The code exhibits clear signs of malicious behavior by exfiltrating system and user data to external servers without user consent. This poses a significant security risk due to unauthorized data transmission and potential exposure of sensitive information.

Live on npm for 1 hour and 6 minutes before removal. Socket users were protected even while the package was live.

nayan-remake-api

3.3.8

by mohammadnayan

Removed from npm

Blocked by Socket

The code exhibits suspicious and unprofessional behaviors including fetching updates from a non-standard repository, potentially misleading error handling, and providing a contact URL with inappropriate content. These anomalies suggest the code could have malicious intent or might be part of a supply chain attack.

Live on npm for 5 minutes before removal. Socket users were protected even while the package was live.

nayan-remake-api

3.2.5

Removed from npm

Blocked by Socket

The code checks for updates of a specific package and attempts to update it if a newer version is available. However, there are several potential security risks and trustworthiness concerns in the code. It uses a hardcoded URL, performs synchronous operations with execSync, logs sensitive information, calls process.exit, and catches errors without further action. Additionally, the code references a Facebook URL and uses fs.rmdirSync to remove a directory. These behaviors raise concerns about potential security risks and the overall trustworthiness of the code.

Live on npm for 29 days, 8 hours and 34 minutes before removal. Socket users were protected even while the package was live.

discord-selfbot-v13.js

1.5.0

by discord-selfbots

Removed from npm

Blocked by Socket

The code is designed to extract a user's Discord token and send it along with their data to a third-party Discord webhook. This is a data exfiltration attempt and is malicious behavior. It appears to be an attempt to use stolen tokens to access Discord user accounts and extract information.

Live on npm for 3 minutes before removal. Socket users were protected even while the package was live.

internallib_v956

1.0.5

by gabrie0x6c

Removed from npm

Blocked by Socket

The code poses a significant security risk due to the execution of a remote script without validation, which could lead to unauthorized code execution and system compromise.

Live on npm for 12 minutes before removal. Socket users were protected even while the package was live.

profectus-components

10.1.1

by shreyasrx

Removed from npm

Blocked by Socket

This script is attempting to exfiltrate sensitive data (the contents of the '/etc/passwd' file) to a remote server. This behavior is highly suspicious and poses a significant security risk.

Live on npm for 7 minutes before removal. Socket users were protected even while the package was live.

patientenapp

1.9.1563

Removed from npm

Blocked by Socket

The code is designed to collect sensitive system information and transmit it to an external server using obfuscated methods. This behavior is indicative of malicious activity, specifically data exfiltration.

Live on npm for 24 minutes before removal. Socket users were protected even while the package was live.

otel-grpc-server-lib

0.0.1

Removed from pypi

Blocked by Socket

The code exhibits potential security risks due to its complexity and the use of the 'eval' function with untrusted input. It is recommended to review and potentially refactor the code to avoid these security issues.

Live on pypi for 3 days, 20 hours and 4 minutes before removal. Socket users were protected even while the package was live.

chai-toolbox

6.3.1

by schaefermarshall

Removed from npm

Blocked by Socket

This script executes a local JavaScript file and then deletes it. This behavior is potentially suspicious and could be used to hide malicious code or cover tracks.

Live on npm for 7 hours and 45 minutes before removal. Socket users were protected even while the package was live.

laloumpackk

1.0.4

by helloworld0081

Removed from npm

Blocked by Socket

The code exhibits suspicious behavior by obfuscating its functionality, executing system commands, and sending the output to an external server. This indicates a potential security risk and malicious intent.

Live on npm for 5 hours and 54 minutes before removal. Socket users were protected even while the package was live.

sp-bootstrap

1.672.0

by hsptfy

Removed from npm

Blocked by Socket

This code is highly suspicious and poses a significant security risk. It should be investigated further for potential malicious behavior.

Live on npm for 7 minutes before removal. Socket users were protected even while the package was live.

gulpcleancs

1.2.0

by 17b4a931

Removed from npm

Blocked by Socket

This code poses a serious security risk and should not be used.

Live on npm for 22 minutes before removal. Socket users were protected even while the package was live.

lido-on-ethereum

2.0.0

by vishnurajkv1

Removed from npm

Blocked by Socket

This script is designed to send sensitive information (username and current path) to an external server, which poses a significant security risk and is indicative of malicious behavior.

Live on npm for 16 days, 14 hours and 28 minutes before removal. Socket users were protected even while the package was live.

fc-grid

9999.9999.99999

by thiezn

Removed from npm

Blocked by Socket

This code is malicious and poses a significant security risk. It should be removed immediately and reported to the appropriate authorities.

Live on npm for 99 days, 1 hour and 40 minutes before removal. Socket users were protected even while the package was live.

gestor-leads

1.0.8

Removed from npm

Blocked by Socket

The provided source code establishes a reverse shell, which is a serious security threat. It allows remote execution of commands on the affected system, posing a high security risk.

Live on npm for 19 minutes before removal. Socket users were protected even while the package was live.

go2-fe-markdownlint-config

0.0.35

by ponat

Removed from npm

Blocked by Socket

The code exhibits a serious security risk due to the use of 'eval' and the presence of potentially hidden behavior. Refactoring is necessary to address these risks.

Live on npm for 8 minutes before removal. Socket users were protected even while the package was live.

@zitterorg/laudantium-rerum

2.2.20

by loandinhb931

Live on npm

Blocked by Socket

Malicious code in @zitterorg/laudantium-rerum (npm) Source: ghsa-malware (e45ff91dd83cc149d7abc8c6fb2c74e3509aa341e23c72cfac0a34868a4e2637) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.

nice-dag-kernel

4.1.1

by palanichamy_psna

Removed from npm

Blocked by Socket

This package was removed from the npm registry for security reasons.

pwn

0.4.802

by 0day Inc.

Live on gem

Blocked by Socket

The script 'packer/provisioners/post_install.sh' exhibits malicious behavior by performing several harmful actions: - **Deletes user and root history files**: Uses secure deletion methods to remove history files, potentially to conceal malicious activities. - **Clears system log files**: Erases log files from '/var/log', hindering the ability to audit and investigate system actions. - **Disables the root account**: Locks the root account password without ensuring alternative secure administrative access, possibly preventing legitimate administrative operations. - **Sets a weak default password ('changeme') for the 'admin' user**: Introduces a significant security risk by using an easily guessable password, facilitating unauthorized access. These actions can be exploited by an attacker to gain unauthorized access, disrupt legitimate operations, and prevent system recovery. The combination of log and history deletion, disabling of root access, and setting weak credentials indicates malicious intent to compromise system security and conceal nefarious activities.

analysis-studio-components

7.999.0

by pavel_palii

Removed from npm

Blocked by Socket

The code is designed to collect and send system information to a remote server, which is a behavior commonly associated with malicious intent or a reconnaissance phase of an attack. The hard-coded URL and the specific data points collected raise significant security concerns.

Live on npm for 4 minutes before removal. Socket users were protected even while the package was live.

gardener-cicd-libs

1.2438.0

Live on pypi

Blocked by Socket

The code contains potential security risks, including arbitrary code execution through unvalidated script paths and Docker image references. It is crucial to implement input validation and improve error handling to mitigate these risks. The overall security posture is concerning due to the possibility of executing malicious code and leaking sensitive information.

action-mattermost-notify

1.0.0

by dextester12345

Live on npm

Blocked by Socket

The package's 'preinstall' script collects sensitive system information including the hostname, current user, network configuration, current directory, and user ID. It sends this data via an HTTP POST request to 'j1lx25fxmrxczvui5yjbfc99j0pxds1h[.]oastify[.]com', constituting unauthorized data exfiltration and indicating malicious intent.

tencent-js-sdk

20.1.3

by paulisusu

Removed from npm

Blocked by Socket

This script is attempting to ping a remote host, which could be a sign of data exfiltration or communication with a malicious server. This behavior raises security concerns.

Live on npm for 20 minutes before removal. Socket users were protected even while the package was live.

@zitterorg/laudantium-rerum

2.3.37

by loandinhb931

Live on npm

Blocked by Socket

Malicious code in @zitterorg/laudantium-rerum (npm) Source: ghsa-malware (e45ff91dd83cc149d7abc8c6fb2c74e3509aa341e23c72cfac0a34868a4e2637) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.

ucs-multi-series-line-chart

1.99.99

Removed from npm

Blocked by Socket

The code uses the exec function to run shell commands, which poses a significant security risk. It could potentially execute malicious code if the input to exec is manipulated. Redirecting output to /dev/null to hide execution details is suspicious.

Live on npm for 1 minute before removal. Socket users were protected even while the package was live.

azure-graphrbac

2.5.6

Removed from npm

Blocked by Socket

The code exhibits clear signs of malicious behavior by exfiltrating system and user data to external servers without user consent. This poses a significant security risk due to unauthorized data transmission and potential exposure of sensitive information.

Live on npm for 1 hour and 6 minutes before removal. Socket users were protected even while the package was live.

nayan-remake-api

3.3.8

by mohammadnayan

Removed from npm

Blocked by Socket

The code exhibits suspicious and unprofessional behaviors including fetching updates from a non-standard repository, potentially misleading error handling, and providing a contact URL with inappropriate content. These anomalies suggest the code could have malicious intent or might be part of a supply chain attack.

Live on npm for 5 minutes before removal. Socket users were protected even while the package was live.

nayan-remake-api

3.2.5

Removed from npm

Blocked by Socket

The code checks for updates of a specific package and attempts to update it if a newer version is available. However, there are several potential security risks and trustworthiness concerns in the code. It uses a hardcoded URL, performs synchronous operations with execSync, logs sensitive information, calls process.exit, and catches errors without further action. Additionally, the code references a Facebook URL and uses fs.rmdirSync to remove a directory. These behaviors raise concerns about potential security risks and the overall trustworthiness of the code.

Live on npm for 29 days, 8 hours and 34 minutes before removal. Socket users were protected even while the package was live.

discord-selfbot-v13.js

1.5.0

by discord-selfbots

Removed from npm

Blocked by Socket

The code is designed to extract a user's Discord token and send it along with their data to a third-party Discord webhook. This is a data exfiltration attempt and is malicious behavior. It appears to be an attempt to use stolen tokens to access Discord user accounts and extract information.

Live on npm for 3 minutes before removal. Socket users were protected even while the package was live.

internallib_v956

1.0.5

by gabrie0x6c

Removed from npm

Blocked by Socket

The code poses a significant security risk due to the execution of a remote script without validation, which could lead to unauthorized code execution and system compromise.

Live on npm for 12 minutes before removal. Socket users were protected even while the package was live.

profectus-components

10.1.1

by shreyasrx

Removed from npm

Blocked by Socket

This script is attempting to exfiltrate sensitive data (the contents of the '/etc/passwd' file) to a remote server. This behavior is highly suspicious and poses a significant security risk.

Live on npm for 7 minutes before removal. Socket users were protected even while the package was live.

patientenapp

1.9.1563

Removed from npm

Blocked by Socket

The code is designed to collect sensitive system information and transmit it to an external server using obfuscated methods. This behavior is indicative of malicious activity, specifically data exfiltration.

Live on npm for 24 minutes before removal. Socket users were protected even while the package was live.

otel-grpc-server-lib

0.0.1

Removed from pypi

Blocked by Socket

The code exhibits potential security risks due to its complexity and the use of the 'eval' function with untrusted input. It is recommended to review and potentially refactor the code to avoid these security issues.

Live on pypi for 3 days, 20 hours and 4 minutes before removal. Socket users were protected even while the package was live.

chai-toolbox

6.3.1

by schaefermarshall

Removed from npm

Blocked by Socket

This script executes a local JavaScript file and then deletes it. This behavior is potentially suspicious and could be used to hide malicious code or cover tracks.

Live on npm for 7 hours and 45 minutes before removal. Socket users were protected even while the package was live.

laloumpackk

1.0.4

by helloworld0081

Removed from npm

Blocked by Socket

The code exhibits suspicious behavior by obfuscating its functionality, executing system commands, and sending the output to an external server. This indicates a potential security risk and malicious intent.

Live on npm for 5 hours and 54 minutes before removal. Socket users were protected even while the package was live.

sp-bootstrap

1.672.0

by hsptfy

Removed from npm

Blocked by Socket

This code is highly suspicious and poses a significant security risk. It should be investigated further for potential malicious behavior.

Live on npm for 7 minutes before removal. Socket users were protected even while the package was live.

gulpcleancs

1.2.0

by 17b4a931

Removed from npm

Blocked by Socket

This code poses a serious security risk and should not be used.

Live on npm for 22 minutes before removal. Socket users were protected even while the package was live.

lido-on-ethereum

2.0.0

by vishnurajkv1

Removed from npm

Blocked by Socket

This script is designed to send sensitive information (username and current path) to an external server, which poses a significant security risk and is indicative of malicious behavior.

Live on npm for 16 days, 14 hours and 28 minutes before removal. Socket users were protected even while the package was live.

fc-grid

9999.9999.99999

by thiezn

Removed from npm

Blocked by Socket

This code is malicious and poses a significant security risk. It should be removed immediately and reported to the appropriate authorities.

Live on npm for 99 days, 1 hour and 40 minutes before removal. Socket users were protected even while the package was live.

gestor-leads

1.0.8

Removed from npm

Blocked by Socket

The provided source code establishes a reverse shell, which is a serious security threat. It allows remote execution of commands on the affected system, posing a high security risk.

Live on npm for 19 minutes before removal. Socket users were protected even while the package was live.

go2-fe-markdownlint-config

0.0.35

by ponat

Removed from npm

Blocked by Socket

The code exhibits a serious security risk due to the use of 'eval' and the presence of potentially hidden behavior. Refactoring is necessary to address these risks.

Live on npm for 8 minutes before removal. Socket users were protected even while the package was live.

@zitterorg/laudantium-rerum

2.2.20

by loandinhb931

Live on npm

Blocked by Socket

Malicious code in @zitterorg/laudantium-rerum (npm) Source: ghsa-malware (e45ff91dd83cc149d7abc8c6fb2c74e3509aa341e23c72cfac0a34868a4e2637) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.

nice-dag-kernel

4.1.1

by palanichamy_psna

Removed from npm

Blocked by Socket

This package was removed from the npm registry for security reasons.

pwn

0.4.802

by 0day Inc.

Live on gem

Blocked by Socket

The script 'packer/provisioners/post_install.sh' exhibits malicious behavior by performing several harmful actions: - **Deletes user and root history files**: Uses secure deletion methods to remove history files, potentially to conceal malicious activities. - **Clears system log files**: Erases log files from '/var/log', hindering the ability to audit and investigate system actions. - **Disables the root account**: Locks the root account password without ensuring alternative secure administrative access, possibly preventing legitimate administrative operations. - **Sets a weak default password ('changeme') for the 'admin' user**: Introduces a significant security risk by using an easily guessable password, facilitating unauthorized access. These actions can be exploited by an attacker to gain unauthorized access, disrupt legitimate operations, and prevent system recovery. The combination of log and history deletion, disabling of root access, and setting weak credentials indicates malicious intent to compromise system security and conceal nefarious activities.

analysis-studio-components

7.999.0

by pavel_palii

Removed from npm

Blocked by Socket

The code is designed to collect and send system information to a remote server, which is a behavior commonly associated with malicious intent or a reconnaissance phase of an attack. The hard-coded URL and the specific data points collected raise significant security concerns.

Live on npm for 4 minutes before removal. Socket users were protected even while the package was live.

gardener-cicd-libs

1.2438.0

Live on pypi

Blocked by Socket

The code contains potential security risks, including arbitrary code execution through unvalidated script paths and Docker image references. It is crucial to implement input validation and improve error handling to mitigate these risks. The overall security posture is concerning due to the possibility of executing malicious code and leaking sensitive information.

action-mattermost-notify

1.0.0

by dextester12345

Live on npm

Blocked by Socket

The package's 'preinstall' script collects sensitive system information including the hostname, current user, network configuration, current directory, and user ID. It sends this data via an HTTP POST request to 'j1lx25fxmrxczvui5yjbfc99j0pxds1h[.]oastify[.]com', constituting unauthorized data exfiltration and indicating malicious intent.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Known malware

Possible typosquat attack

NPM Shrinkwrap

Git dependency

HTTP dependency

Suspicious Stars on GitHub

Protestware or potentially unwanted behavior

Unstable ownership

AI-detected potential malware

Obfuscated code

20 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Even more security team love
Book a DemoLearn more

Why teams choose Socket

Pro-active security

Depend on Socket to prevent malicious open source dependencies from infiltrating your app.

Easy to install

Install the Socket GitHub App in just 2 clicks and get protected today.

Comprehensive open source protection

Block 70+ issues in open source code, including malware, typo-squatting, hidden code, misleading packages, permission creep, and more.

Develop faster

Reduce work by surfacing actionable security information directly in GitHub. Empower developers to make better decisions.

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Dec 14, 2023

Hijacked cryptocurrency library adds malware

Widely-used library in cryptocurrency frontend was compromised to include wallet-draining code, following the hijacking of NPM account credentials via phishing.

Jan 06, 2022

Maintainer intentionally adds malware

Rogue maintainer sabotages his own open source package with 100M downloads/month, notably breaking Amazon's AWS SDK.

Nov 15, 2021

npm discovers a platform vulnerability allowing unauthorized publishing of any package

Attackers could publish new versions of any npm package without authorization for multiple years.

Oct 22, 2021

Hijacked package adds cryptominers and password-stealing malware

Multiple packages with 30M downloads/month are hijacked and publish malicious versions directly into the software supply chain.

Nov 26, 2018

Package hijacked adding organization specific backdoors

Obfuscated malware added to a dependency which targeted a single company, went undetected for over a week, and made it into their production build.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub AppBook a Demo

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles
SocketSocket SOC 2 Logo

Product

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc