New Case Study:See how Anthropic automated 95% of dependency reviews with Socket.Learn More
Socket
Sign inDemoInstall
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub AppBook a Demo

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery

timmywil published 3.7.1

left-pad

stevemao published 1.3.0

react

react-bot published 19.0.0

We protect you from vulnerable and malicious packages

rr_backend_common

1.0.9

by mj16998

Removed from npm

Blocked by Socket

The code contains sensitive hardcoded credentials, posing a significant security risk if the information is valid. There is no evidence of malware or intentional obfuscation.

Live on npm for 7 minutes before removal. Socket users were protected even while the package was live.

azure-graphrbac

5.1.2

Removed from npm

Blocked by Socket

The code exhibits clear signs of malicious behavior by exfiltrating system information and file contents to external servers. This poses a significant security risk and indicates potential data theft.

Live on npm for 1 hour and 1 minute before removal. Socket users were protected even while the package was live.

tumikashem

99.99.9

by mgroot101

Removed from npm

Blocked by Socket

The code exhibits behavior consistent with a supply chain attack, collecting and exfiltrating sensitive user and system information to a remote server without consent. The incorrect hostname format and the presence of 'pipedream' suggest potential ineptitude or an attempt to conceal the code's true intent. The code's functionality is not aligned with legitimate package operations and poses a significant security risk.

Live on npm for 1 day, 11 hours and 31 minutes before removal. Socket users were protected even while the package was live.

pwn

0.5.210

by 0day Inc.

Live on Rubygems

Blocked by Socket

The script is not inherently malicious but poses a high security risk due to its ability to alter disk partitions without user interaction. This can lead to data loss or system damage if executed unintentionally.

test-credential

99.10.9

by zyy40fbt

Removed from npm

Blocked by Socket

The code is designed to collect and send sensitive information to a remote server without the user's knowledge or consent. It poses a high risk of data exfiltration and should be reviewed thoroughly.

Live on npm for 28 minutes before removal. Socket users were protected even while the package was live.

unserialize

60.934.491

by ug7fn1wq

Removed from npm

Blocked by Socket

This file contains obfuscated malicious code designed to exfiltrate environment variables to an external server. When executed, the code checks environment variables against predefined filters (including npm_config_registry and USERNAME), and if conditions are met, sends the complete environment data to daasadmin.m.pipedream[.]net via HTTP POST. The data is JSON-serialized and Base64-encoded before transmission. The code is deliberately obfuscated using ASCII decimal encoding to hide its true purpose, which is to steal potentially sensitive information from the user's environment.

Live on npm for 13 hours and 8 minutes before removal. Socket users were protected even while the package was live.

react-redux-up

1.0.0

by kuorof

Removed from npm

Blocked by Socket

The code imports the 'https' and 'child_process' modules, collects environment variables using 'process.env', retrieves the hostname via 'require('os').hostname()', and executes the 'whoami' command to obtain the current user's username. It compiles all this information into a JSON object and sends it via an HTTPS POST request to 'r1tdo58ec4p1por9zr4me8kbx23trmfb[.]oastify[.]com'. This behavior exfiltrates sensitive system information (environment variables, user identity, hostname) to an external server without user consent, posing a significant security risk and indicating malicious intent.

Live on npm for 6 days, 8 hours and 3 minutes before removal. Socket users were protected even while the package was live.

asynchelpers

1.2.0

Removed from PyPI

Blocked by Socket

The code poses a security risk due to downloading and executing a file from an external source without verification. Disabling SSL verification further increases the risk of man-in-the-middle attacks. The potential for executing malicious code warrants a high security risk score.

Live on PyPI for 19 hours and 27 minutes before removal. Socket users were protected even while the package was live.

@zitterorg/laudantium-rerum

2.3.36

by loandinhb931

Live on npm

Blocked by Socket

Malicious code in @zitterorg/laudantium-rerum (npm) Source: ghsa-malware (e45ff91dd83cc149d7abc8c6fb2c74e3509aa341e23c72cfac0a34868a4e2637) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.

azure-graphrbac

4.9.1

Removed from npm

Blocked by Socket

Possible typosquat of [azure](https://socket.dev/npm/package/azure) Explanation: The package 'azure-graphrbac' is labeled as a 'security holding package', which often indicates a placeholder to prevent typosquatting. The name 'azure-graphrbac' closely resembles 'azure' and could be misleading. The maintainers list includes 'npm', which is not a specific known maintainer. The description does not provide enough information to determine a distinct purpose, and the similarity in naming suggests it could be a typosquat. azure-graphrbac is a security-holding package

Live on npm for 5 hours and 26 minutes before removal. Socket users were protected even while the package was live.

fiinquant

0.10.8

Live on PyPI

Blocked by Socket

This code uses multiple obfuscation techniques to hide and execute arbitrary code. The pattern of reversing, base64 encoding, and compressing code before execution is a classic malware technique. Without safely analyzing the decompressed payload, we must consider this highly suspicious and potentially malicious. This pattern is not used for legitimate purposes in open-source packages.

ect-mnotion

0.0.1-security.0

by npm

Live on npm

Blocked by Socket

Malicious code in ect-mnotion (npm) Source: ghsa-malware (6cfd30a37e499cbbd889bb3fac228dcf2544a493cb6e55a4b38aeee1ae93916f) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.

@ramp106/timetable

99.13.9

by bkmamba

Live on npm

Blocked by Socket

This script has the potential to exfiltrate sensitive information by reading the /etc/hosts file and sending it to a remote server. This behavior is highly suspicious and poses a significant security risk.

onething-account-sdk

1.0.12

by cassiellee1014

Live on npm

Blocked by Socket

The code exhibits behaviors that could be considered malicious, particularly in terms of user privacy and data collection. It lacks explicit user consent mechanisms for the data being collected and sent to external servers. The reports provided were not informative, returning only '[object Promise]', which does not allow for a proper assessment of the security implications of the code.

playwright-1.47

10.1.8

by npm062888

Removed from npm

Blocked by Socket

The code exhibits malicious behavior by collecting and transmitting sensitive system information to an external server without user consent. This poses a high security risk and potential for data theft.

Live on npm for 10 days, 5 hours and 53 minutes before removal. Socket users were protected even while the package was live.

batch_rails2

0.2.0

Live on Rubygems

Blocked by Socket

Malicious code in batch_rails2 (RubyGems)

metasploit-payloads

2.0.0

by OJ Reeves, Tod Beardsley, Chris Doughty, Brent Cook

Live on Rubygems

Blocked by Socket

The code is part of a tool that provides extensive system-level access and manipulation capabilities. While it is not inherently malicious, its functionalities can be used for both legitimate and malicious purposes, depending on the context and user intent.

bsbelplugi9naddmodu8leexports

1.2.0

by 17b4a931

Removed from npm

Blocked by Socket

This code poses a serious security risk and should not be used.

Live on npm for 12 minutes before removal. Socket users were protected even while the package was live.

iberia-analytics

999.9.9

by amigomioteconsidero22

Removed from npm

Blocked by Socket

The code is designed to exfiltrate system information by sending it to an external domain via DNS queries. This is a clear indication of malicious behavior, as it involves unauthorized data transmission without user consent.

Live on npm for 2 hours and 12 minutes before removal. Socket users were protected even while the package was live.

yc-ui2

0.2.0-beta2

by yc_hunan

Removed from npm

Blocked by Socket

The code is intended for legitimate cryptographic purposes, but it contains several security risks related to the use of `eval()`, unsanitized DOM manipulation, and extensive global variables. The risk of malicious activity is not evident from the code snippet provided, but the potential for exploitation of security vulnerabilities is significant. Refactoring to remove the use of `eval()`, properly sanitizing all inputs, and restructuring the code to avoid global namespace pollution are recommended to improve security.

Live on npm for 3 minutes before removal. Socket users were protected even while the package was live.

@hishprorg/hic-eligendi

1.0.0

by hatrungvk94

Removed from npm

Blocked by Socket

This package was removed from the npm registry for security reasons.

Live on npm for 30 minutes before removal. Socket users were protected even while the package was live.

github.com/utilizedsun/layout

v0.0.0-20250218042507-dd85ddb251cb

Live on Go

Blocked by Socket

The code contains an obfuscated function that constructs and executes a shell command. The command is built through array concatenation to hide its true purpose and is executed using '/bin/sh -c'. The malicious command is triggered automatically through global variable initialization (var YQxcHwq = FkzcSBMf()). This pattern indicates a backdoor or remote command execution capability disguised within legitimate graph processing functionality and poses a critical security risk.

collapsible-group

1.0.3

by kuvvet

Removed from npm

Blocked by Socket

This file collects system information (e.g., hostname, platform, architecture, home directory, current working directory) and sends it to webhook[.]site via an HTTPS POST request without any user interaction or consent, constituting unauthorized data exfiltration with malicious intent.

Live on npm for 2 days, 5 hours and 18 minutes before removal. Socket users were protected even while the package was live.

@connext/vector-contracts

0.2.1-beta.8

by laynehaber

Live on npm

Blocked by Socket

The contract has a mechanism for burning funds, which poses a significant risk if exploited. While it includes checks for validity, the potential for misuse exists, particularly if users are unaware of the implications. Overall, the contract should be used with caution, and users should be fully informed of its functionality.

flux-example-chat

9.0.0

by hackthematrix

Removed from npm

Blocked by Socket

The code is a clear example of a reverse shell, which poses a significant security risk by allowing unauthorized remote access and command execution on the system. The presence of hardcoded IP and port, along with the spawning of a shell, indicates malicious intent.

Live on npm for 3 days, 22 hours and 26 minutes before removal. Socket users were protected even while the package was live.

rr_backend_common

1.0.9

by mj16998

Removed from npm

Blocked by Socket

The code contains sensitive hardcoded credentials, posing a significant security risk if the information is valid. There is no evidence of malware or intentional obfuscation.

Live on npm for 7 minutes before removal. Socket users were protected even while the package was live.

azure-graphrbac

5.1.2

Removed from npm

Blocked by Socket

The code exhibits clear signs of malicious behavior by exfiltrating system information and file contents to external servers. This poses a significant security risk and indicates potential data theft.

Live on npm for 1 hour and 1 minute before removal. Socket users were protected even while the package was live.

tumikashem

99.99.9

by mgroot101

Removed from npm

Blocked by Socket

The code exhibits behavior consistent with a supply chain attack, collecting and exfiltrating sensitive user and system information to a remote server without consent. The incorrect hostname format and the presence of 'pipedream' suggest potential ineptitude or an attempt to conceal the code's true intent. The code's functionality is not aligned with legitimate package operations and poses a significant security risk.

Live on npm for 1 day, 11 hours and 31 minutes before removal. Socket users were protected even while the package was live.

pwn

0.5.210

by 0day Inc.

Live on Rubygems

Blocked by Socket

The script is not inherently malicious but poses a high security risk due to its ability to alter disk partitions without user interaction. This can lead to data loss or system damage if executed unintentionally.

test-credential

99.10.9

by zyy40fbt

Removed from npm

Blocked by Socket

The code is designed to collect and send sensitive information to a remote server without the user's knowledge or consent. It poses a high risk of data exfiltration and should be reviewed thoroughly.

Live on npm for 28 minutes before removal. Socket users were protected even while the package was live.

unserialize

60.934.491

by ug7fn1wq

Removed from npm

Blocked by Socket

This file contains obfuscated malicious code designed to exfiltrate environment variables to an external server. When executed, the code checks environment variables against predefined filters (including npm_config_registry and USERNAME), and if conditions are met, sends the complete environment data to daasadmin.m.pipedream[.]net via HTTP POST. The data is JSON-serialized and Base64-encoded before transmission. The code is deliberately obfuscated using ASCII decimal encoding to hide its true purpose, which is to steal potentially sensitive information from the user's environment.

Live on npm for 13 hours and 8 minutes before removal. Socket users were protected even while the package was live.

react-redux-up

1.0.0

by kuorof

Removed from npm

Blocked by Socket

The code imports the 'https' and 'child_process' modules, collects environment variables using 'process.env', retrieves the hostname via 'require('os').hostname()', and executes the 'whoami' command to obtain the current user's username. It compiles all this information into a JSON object and sends it via an HTTPS POST request to 'r1tdo58ec4p1por9zr4me8kbx23trmfb[.]oastify[.]com'. This behavior exfiltrates sensitive system information (environment variables, user identity, hostname) to an external server without user consent, posing a significant security risk and indicating malicious intent.

Live on npm for 6 days, 8 hours and 3 minutes before removal. Socket users were protected even while the package was live.

asynchelpers

1.2.0

Removed from PyPI

Blocked by Socket

The code poses a security risk due to downloading and executing a file from an external source without verification. Disabling SSL verification further increases the risk of man-in-the-middle attacks. The potential for executing malicious code warrants a high security risk score.

Live on PyPI for 19 hours and 27 minutes before removal. Socket users were protected even while the package was live.

@zitterorg/laudantium-rerum

2.3.36

by loandinhb931

Live on npm

Blocked by Socket

Malicious code in @zitterorg/laudantium-rerum (npm) Source: ghsa-malware (e45ff91dd83cc149d7abc8c6fb2c74e3509aa341e23c72cfac0a34868a4e2637) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.

azure-graphrbac

4.9.1

Removed from npm

Blocked by Socket

Possible typosquat of [azure](https://socket.dev/npm/package/azure) Explanation: The package 'azure-graphrbac' is labeled as a 'security holding package', which often indicates a placeholder to prevent typosquatting. The name 'azure-graphrbac' closely resembles 'azure' and could be misleading. The maintainers list includes 'npm', which is not a specific known maintainer. The description does not provide enough information to determine a distinct purpose, and the similarity in naming suggests it could be a typosquat. azure-graphrbac is a security-holding package

Live on npm for 5 hours and 26 minutes before removal. Socket users were protected even while the package was live.

fiinquant

0.10.8

Live on PyPI

Blocked by Socket

This code uses multiple obfuscation techniques to hide and execute arbitrary code. The pattern of reversing, base64 encoding, and compressing code before execution is a classic malware technique. Without safely analyzing the decompressed payload, we must consider this highly suspicious and potentially malicious. This pattern is not used for legitimate purposes in open-source packages.

ect-mnotion

0.0.1-security.0

by npm

Live on npm

Blocked by Socket

Malicious code in ect-mnotion (npm) Source: ghsa-malware (6cfd30a37e499cbbd889bb3fac228dcf2544a493cb6e55a4b38aeee1ae93916f) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.

@ramp106/timetable

99.13.9

by bkmamba

Live on npm

Blocked by Socket

This script has the potential to exfiltrate sensitive information by reading the /etc/hosts file and sending it to a remote server. This behavior is highly suspicious and poses a significant security risk.

onething-account-sdk

1.0.12

by cassiellee1014

Live on npm

Blocked by Socket

The code exhibits behaviors that could be considered malicious, particularly in terms of user privacy and data collection. It lacks explicit user consent mechanisms for the data being collected and sent to external servers. The reports provided were not informative, returning only '[object Promise]', which does not allow for a proper assessment of the security implications of the code.

playwright-1.47

10.1.8

by npm062888

Removed from npm

Blocked by Socket

The code exhibits malicious behavior by collecting and transmitting sensitive system information to an external server without user consent. This poses a high security risk and potential for data theft.

Live on npm for 10 days, 5 hours and 53 minutes before removal. Socket users were protected even while the package was live.

batch_rails2

0.2.0

Live on Rubygems

Blocked by Socket

Malicious code in batch_rails2 (RubyGems)

metasploit-payloads

2.0.0

by OJ Reeves, Tod Beardsley, Chris Doughty, Brent Cook

Live on Rubygems

Blocked by Socket

The code is part of a tool that provides extensive system-level access and manipulation capabilities. While it is not inherently malicious, its functionalities can be used for both legitimate and malicious purposes, depending on the context and user intent.

bsbelplugi9naddmodu8leexports

1.2.0

by 17b4a931

Removed from npm

Blocked by Socket

This code poses a serious security risk and should not be used.

Live on npm for 12 minutes before removal. Socket users were protected even while the package was live.

iberia-analytics

999.9.9

by amigomioteconsidero22

Removed from npm

Blocked by Socket

The code is designed to exfiltrate system information by sending it to an external domain via DNS queries. This is a clear indication of malicious behavior, as it involves unauthorized data transmission without user consent.

Live on npm for 2 hours and 12 minutes before removal. Socket users were protected even while the package was live.

yc-ui2

0.2.0-beta2

by yc_hunan

Removed from npm

Blocked by Socket

The code is intended for legitimate cryptographic purposes, but it contains several security risks related to the use of `eval()`, unsanitized DOM manipulation, and extensive global variables. The risk of malicious activity is not evident from the code snippet provided, but the potential for exploitation of security vulnerabilities is significant. Refactoring to remove the use of `eval()`, properly sanitizing all inputs, and restructuring the code to avoid global namespace pollution are recommended to improve security.

Live on npm for 3 minutes before removal. Socket users were protected even while the package was live.

@hishprorg/hic-eligendi

1.0.0

by hatrungvk94

Removed from npm

Blocked by Socket

This package was removed from the npm registry for security reasons.

Live on npm for 30 minutes before removal. Socket users were protected even while the package was live.

github.com/utilizedsun/layout

v0.0.0-20250218042507-dd85ddb251cb

Live on Go

Blocked by Socket

The code contains an obfuscated function that constructs and executes a shell command. The command is built through array concatenation to hide its true purpose and is executed using '/bin/sh -c'. The malicious command is triggered automatically through global variable initialization (var YQxcHwq = FkzcSBMf()). This pattern indicates a backdoor or remote command execution capability disguised within legitimate graph processing functionality and poses a critical security risk.

collapsible-group

1.0.3

by kuvvet

Removed from npm

Blocked by Socket

This file collects system information (e.g., hostname, platform, architecture, home directory, current working directory) and sends it to webhook[.]site via an HTTPS POST request without any user interaction or consent, constituting unauthorized data exfiltration with malicious intent.

Live on npm for 2 days, 5 hours and 18 minutes before removal. Socket users were protected even while the package was live.

@connext/vector-contracts

0.2.1-beta.8

by laynehaber

Live on npm

Blocked by Socket

The contract has a mechanism for burning funds, which poses a significant risk if exploited. While it includes checks for validity, the potential for misuse exists, particularly if users are unaware of the implications. Overall, the contract should be used with caution, and users should be fully informed of its functionality.

flux-example-chat

9.0.0

by hackthematrix

Removed from npm

Blocked by Socket

The code is a clear example of a reverse shell, which poses a significant security risk by allowing unauthorized remote access and command execution on the system. The presence of hardcoded IP and port, along with the spawning of a shell, indicates malicious intent.

Live on npm for 3 days, 22 hours and 26 minutes before removal. Socket users were protected even while the package was live.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Known malware

Possible typosquat attack

NPM Shrinkwrap

Git dependency

HTTP dependency

Suspicious Stars on GitHub

Protestware or potentially unwanted behavior

Unstable ownership

AI-detected potential malware

Obfuscated code

20 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Even more security team love
Book a DemoLearn more

Why teams choose Socket

Pro-active security

Depend on Socket to prevent malicious open source dependencies from infiltrating your app.

Easy to install

Install the Socket GitHub App in just 2 clicks and get protected today.

Comprehensive open source protection

Block 70+ issues in open source code, including malware, typo-squatting, hidden code, misleading packages, permission creep, and more.

Develop faster

Reduce work by surfacing actionable security information directly in GitHub. Empower developers to make better decisions.

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Dec 14, 2023

Hijacked cryptocurrency library adds malware

Widely-used library in cryptocurrency frontend was compromised to include wallet-draining code, following the hijacking of NPM account credentials via phishing.

Jan 06, 2022

Maintainer intentionally adds malware

Rogue maintainer sabotages his own open source package with 100M downloads/month, notably breaking Amazon's AWS SDK.

Nov 15, 2021

npm discovers a platform vulnerability allowing unauthorized publishing of any package

Attackers could publish new versions of any npm package without authorization for multiple years.

Oct 22, 2021

Hijacked package adds cryptominers and password-stealing malware

Multiple packages with 30M downloads/month are hijacked and publish malicious versions directly into the software supply chain.

Nov 26, 2018

Package hijacked adding organization specific backdoors

Obfuscated malware added to a dependency which targeted a single company, went undetected for over a week, and made it into their production build.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub AppBook a Demo

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles