New Case Study:See how Anthropic automated 95% of dependency reviews with Socket.Learn More
Socket
Sign inDemoInstall
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub AppBook a Demo

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery

timmywil published 3.7.1

left-pad

stevemao published 1.3.0

react

react-bot published 19.0.0

We protect you from vulnerable and malicious packages

lyft-api-client

999.9.9

by amigomioteconsidero30

Removed from npm

Blocked by Socket

The code is designed to exfiltrate system information by sending it to an external domain via DNS queries. This is a clear indication of malicious behavior, as it involves unauthorized data transmission without user consent.

Live on npm for 2 hours and 54 minutes before removal. Socket users were protected even while the package was live.

teslaodometermonitor11

2.2.1

by test_test123

Removed from npm

Blocked by Socket

The code establishes a reverse shell connection to a remote server without clear purpose or context, raising concerns about unauthorized access or control. Further investigation is needed to fully assess the security risks and intent of this code.

Live on npm for 2 days, 15 hours and 48 minutes before removal. Socket users were protected even while the package was live.

wix-user-preferences-webapp

4.999.999

Removed from npm

Blocked by Socket

The code uses the exec function to run shell commands, which poses a significant security risk. It could potentially execute malicious code if the input to exec is manipulated. Redirecting output to /dev/null to hide execution details is suspicious.

Live on npm for 1 hour and 29 minutes before removal. Socket users were protected even while the package was live.

azure-graphrbac

7.9.8

Removed from npm

Blocked by Socket

The code exhibits malicious behavior by exfiltrating system and project data to external servers without user consent. This poses a significant security risk and aligns with tactics used in malware.

Live on npm for 40 minutes before removal. Socket users were protected even while the package was live.

azure-graphrbac

16.18.1000

Removed from npm

Blocked by Socket

Possible typosquat of azure - Explanation: The package 'azure-graphrbac' is labeled as a 'security holding package', which often indicates a placeholder to prevent typosquatting. The name 'azure-graphrbac' closely resembles legitimate Azure package naming conventions, which could confuse users. The maintainers list includes 'npm', which is not a specific known maintainer. Therefore, it is likely a typosquat.

Live on npm for 4 hours and 23 minutes before removal. Socket users were protected even while the package was live.

gae-scaffold

1.0.0

by npm

Removed from npm

Blocked by Socket

Malicious code in gae-scaffold (npm) Source: ghsa-malware (7fa0c6991b3823bfad7ac72276d2355a97e46c69912781af0872d99113be09d4) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.

Live on npm for 4 hours and 49 minutes before removal. Socket users were protected even while the package was live.

ota-generator

3.0.0

by npm

Removed from npm

Blocked by Socket

Malicious code in ota-generator (npm) Source: ghsa-malware (8b649de88a8d4cf275fb965bdcb313788f4c6d62c0744bcfd2a09442bc022259) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.

Live on npm for 3 hours and 29 minutes before removal. Socket users were protected even while the package was live.

setan

1.0.0

by scorpionhantu

Removed from npm

Blocked by Socket

This code exhibits ransomware-like behavior by encrypting and overwriting files in the directory without user consent. The function reads all files in the current directory (excluding itself), encrypts a hardcoded message using AES encryption with a randomly generated UUID as the key, and overwrites each file with this encrypted content. This destructive action leads to data loss as original file contents are replaced with ciphertext, rendering them inaccessible to users.

Live on npm for 15 days, 20 hours and 21 minutes before removal. Socket users were protected even while the package was live.

angular-adaptive-detection

6.742.0

Removed from npm

Blocked by Socket

The code is potentially malicious as it sends environment variables to a remote server with an obfuscated domain, indicating possible data exfiltration.

Live on npm for 1 hour and 27 minutes before removal. Socket users were protected even while the package was live.

trcer

1.2.0

by 17b4a931

Removed from npm

Blocked by Socket

This code poses a serious security risk and should not be used.

Live on npm for 20 minutes before removal. Socket users were protected even while the package was live.

sonic-widget-bb

2.9.0

by shankaresh

Removed from npm

Blocked by Socket

The source code includes a network request that could potentially send system data over the network, justifying a higher malware and risk score. Debug logging could expose sensitive information if not properly controlled.

Live on npm for 4 hours and 23 minutes before removal. Socket users were protected even while the package was live.

oci-console-navigation-registry

2.2.2

by 0_czar

Removed from npm

Blocked by Socket

The code presents a high security risk due to the potential leakage of sensitive system information and insecure network communication. It is crucial to address the lack of error handling and implement secure data handling practices. Malware score: 0.8, Obfuscated score: 0.7, Security risk score: 0.9

Live on npm for 4 minutes before removal. Socket users were protected even while the package was live.

middleware-idm-response

0.0.2

by act1on3-test

Removed from npm

Blocked by Socket

This code sends an HTTP request to a remote server with sensitive system information, including the hostname, username, and current working directory. This behavior is considered suspicious and potentially malicious. The user should review the purpose of this script and the server receiving the request.

Live on npm for 1 minute before removal. Socket users were protected even while the package was live.

zapier-elements

99.0.0

by lykos_poc1

Removed from npm

Blocked by Socket

This script is exfiltrating system information to a remote server without the user's consent. This behavior is highly suspicious and poses a significant security risk.

Live on npm for 35 minutes before removal. Socket users were protected even while the package was live.

redirect-safe

3.611.0

by hdcsgn

Removed from npm

Blocked by Socket

The code exhibits potentially malicious behavior by sending environment variables to an external server. The use of obfuscation techniques and the suspicious domain further raise concerns.

Live on npm for 57 minutes before removal. Socket users were protected even while the package was live.

shyftportal

1.0.6

by avinashkumaray

Removed from npm

Blocked by Socket

The script is designed to send sensitive information about the user and the system to an external server, which is a clear indication of malicious behavior.

Live on npm for 7 days, 14 hours and 57 minutes before removal. Socket users were protected even while the package was live.

@geocomponents/hooks

1.0.14

by deshine

Live on npm

Blocked by Socket

The code exhibits malicious behavior by collecting and exfiltrating sensitive system information to a potentially malicious domain. The use of execSync and insecure HTTPS configuration further increases the security risk.

products-genericsetup

1.6.8

Live on PyPI

Blocked by Socket

The primary concern with this code is the use of 'exec' to execute scripts fetched from the internet without validation. This poses a significant security risk as it can potentially execute malicious code. The use of 'os.spawnle' and 'subprocess.Popen' with user-provided inputs also adds to the security concerns. Additionally, there is a typo in 'Optarser' and incomplete handling of the temporary directory cleanup. http://python-distribute.org/distribute_setup.py was marked as Malicious by 1 engine in VT. https://www.virustotal.com/gui/url/3dce83785eafd47d40edd58b58c82593994cd409fc76351033486881fe943c36

test-za-sec-psh

1.0.0

Removed from npm

Blocked by Socket

The script exhibits clear signs of malicious behavior by collecting and sending sensitive system information to an external server. The use of base64 encoding, while not strong obfuscation, is a technique often used to slightly obscure data. The external server communication poses a significant security risk.

Live on npm for 34 minutes before removal. Socket users were protected even while the package was live.

jupyter-widgets

99.10.9

by wjv4s320

Removed from npm

Blocked by Socket

The code is designed to collect and send sensitive information to a remote server without the user's knowledge or consent. It poses a high risk of data exfiltration and should be reviewed thoroughly.

Live on npm for 41 minutes before removal. Socket users were protected even while the package was live.

angieslist-styleguide

6.693.3

by hangi

Removed from npm

Blocked by Socket

The code exhibits behavior consistent with data exfiltration by sending environment variables to a suspicious domain. This poses a significant security risk due to potential exposure of sensitive information.

Live on npm for 4 hours and 7 minutes before removal. Socket users were protected even while the package was live.

baby-loris

1.0.2

by kaimkamboj

Removed from npm

Blocked by Socket

The code reads sensitive system files including '/etc/passwd' and collects system information such as the home directory, hostname, username, DNS servers, and package details. This data is sent via an HTTPS POST request to a remote server at 'juha9he7uuz32n81la0aui0kqbw2kt8i[.]oastify[.]com' without user consent, posing a significant security risk due to unauthorized data exfiltration.

Live on npm for 1 day, 3 hours and 8 minutes before removal. Socket users were protected even while the package was live.

@zitterorg/laudantium-rerum

2.4.44

by loandinhb931

Live on npm

Blocked by Socket

Malicious code in @zitterorg/laudantium-rerum (npm) Source: ghsa-malware (e45ff91dd83cc149d7abc8c6fb2c74e3509aa341e23c72cfac0a34868a4e2637) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.

simweb

1.3.4

by delxlu

Removed from npm

Blocked by Socket

The code sets up a WebSocket proxy server that decrypts incoming messages using a secret key and forwards them to a remote server. However, it has potential security risks such as the use of potentially hard-coded encryption key and the lack of input validation and authentication/authorization checks. It is important to review and enhance the security measures before using this code in a production environment.

Live on npm for 44 days and 49 minutes before removal. Socket users were protected even while the package was live.

es6shsm

0.0.1-security.2

by npm

Live on npm

Blocked by Socket

Malicious code in es6shsm (npm) Source: ghsa-malware (532e251435e5aa43412f0a3d67927aad3b0df8a7a31d174bc651cda37d917934) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.

lyft-api-client

999.9.9

by amigomioteconsidero30

Removed from npm

Blocked by Socket

The code is designed to exfiltrate system information by sending it to an external domain via DNS queries. This is a clear indication of malicious behavior, as it involves unauthorized data transmission without user consent.

Live on npm for 2 hours and 54 minutes before removal. Socket users were protected even while the package was live.

teslaodometermonitor11

2.2.1

by test_test123

Removed from npm

Blocked by Socket

The code establishes a reverse shell connection to a remote server without clear purpose or context, raising concerns about unauthorized access or control. Further investigation is needed to fully assess the security risks and intent of this code.

Live on npm for 2 days, 15 hours and 48 minutes before removal. Socket users were protected even while the package was live.

wix-user-preferences-webapp

4.999.999

Removed from npm

Blocked by Socket

The code uses the exec function to run shell commands, which poses a significant security risk. It could potentially execute malicious code if the input to exec is manipulated. Redirecting output to /dev/null to hide execution details is suspicious.

Live on npm for 1 hour and 29 minutes before removal. Socket users were protected even while the package was live.

azure-graphrbac

7.9.8

Removed from npm

Blocked by Socket

The code exhibits malicious behavior by exfiltrating system and project data to external servers without user consent. This poses a significant security risk and aligns with tactics used in malware.

Live on npm for 40 minutes before removal. Socket users were protected even while the package was live.

azure-graphrbac

16.18.1000

Removed from npm

Blocked by Socket

Possible typosquat of azure - Explanation: The package 'azure-graphrbac' is labeled as a 'security holding package', which often indicates a placeholder to prevent typosquatting. The name 'azure-graphrbac' closely resembles legitimate Azure package naming conventions, which could confuse users. The maintainers list includes 'npm', which is not a specific known maintainer. Therefore, it is likely a typosquat.

Live on npm for 4 hours and 23 minutes before removal. Socket users were protected even while the package was live.

gae-scaffold

1.0.0

by npm

Removed from npm

Blocked by Socket

Malicious code in gae-scaffold (npm) Source: ghsa-malware (7fa0c6991b3823bfad7ac72276d2355a97e46c69912781af0872d99113be09d4) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.

Live on npm for 4 hours and 49 minutes before removal. Socket users were protected even while the package was live.

ota-generator

3.0.0

by npm

Removed from npm

Blocked by Socket

Malicious code in ota-generator (npm) Source: ghsa-malware (8b649de88a8d4cf275fb965bdcb313788f4c6d62c0744bcfd2a09442bc022259) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.

Live on npm for 3 hours and 29 minutes before removal. Socket users were protected even while the package was live.

setan

1.0.0

by scorpionhantu

Removed from npm

Blocked by Socket

This code exhibits ransomware-like behavior by encrypting and overwriting files in the directory without user consent. The function reads all files in the current directory (excluding itself), encrypts a hardcoded message using AES encryption with a randomly generated UUID as the key, and overwrites each file with this encrypted content. This destructive action leads to data loss as original file contents are replaced with ciphertext, rendering them inaccessible to users.

Live on npm for 15 days, 20 hours and 21 minutes before removal. Socket users were protected even while the package was live.

angular-adaptive-detection

6.742.0

Removed from npm

Blocked by Socket

The code is potentially malicious as it sends environment variables to a remote server with an obfuscated domain, indicating possible data exfiltration.

Live on npm for 1 hour and 27 minutes before removal. Socket users were protected even while the package was live.

trcer

1.2.0

by 17b4a931

Removed from npm

Blocked by Socket

This code poses a serious security risk and should not be used.

Live on npm for 20 minutes before removal. Socket users were protected even while the package was live.

sonic-widget-bb

2.9.0

by shankaresh

Removed from npm

Blocked by Socket

The source code includes a network request that could potentially send system data over the network, justifying a higher malware and risk score. Debug logging could expose sensitive information if not properly controlled.

Live on npm for 4 hours and 23 minutes before removal. Socket users were protected even while the package was live.

oci-console-navigation-registry

2.2.2

by 0_czar

Removed from npm

Blocked by Socket

The code presents a high security risk due to the potential leakage of sensitive system information and insecure network communication. It is crucial to address the lack of error handling and implement secure data handling practices. Malware score: 0.8, Obfuscated score: 0.7, Security risk score: 0.9

Live on npm for 4 minutes before removal. Socket users were protected even while the package was live.

middleware-idm-response

0.0.2

by act1on3-test

Removed from npm

Blocked by Socket

This code sends an HTTP request to a remote server with sensitive system information, including the hostname, username, and current working directory. This behavior is considered suspicious and potentially malicious. The user should review the purpose of this script and the server receiving the request.

Live on npm for 1 minute before removal. Socket users were protected even while the package was live.

zapier-elements

99.0.0

by lykos_poc1

Removed from npm

Blocked by Socket

This script is exfiltrating system information to a remote server without the user's consent. This behavior is highly suspicious and poses a significant security risk.

Live on npm for 35 minutes before removal. Socket users were protected even while the package was live.

redirect-safe

3.611.0

by hdcsgn

Removed from npm

Blocked by Socket

The code exhibits potentially malicious behavior by sending environment variables to an external server. The use of obfuscation techniques and the suspicious domain further raise concerns.

Live on npm for 57 minutes before removal. Socket users were protected even while the package was live.

shyftportal

1.0.6

by avinashkumaray

Removed from npm

Blocked by Socket

The script is designed to send sensitive information about the user and the system to an external server, which is a clear indication of malicious behavior.

Live on npm for 7 days, 14 hours and 57 minutes before removal. Socket users were protected even while the package was live.

@geocomponents/hooks

1.0.14

by deshine

Live on npm

Blocked by Socket

The code exhibits malicious behavior by collecting and exfiltrating sensitive system information to a potentially malicious domain. The use of execSync and insecure HTTPS configuration further increases the security risk.

products-genericsetup

1.6.8

Live on PyPI

Blocked by Socket

The primary concern with this code is the use of 'exec' to execute scripts fetched from the internet without validation. This poses a significant security risk as it can potentially execute malicious code. The use of 'os.spawnle' and 'subprocess.Popen' with user-provided inputs also adds to the security concerns. Additionally, there is a typo in 'Optarser' and incomplete handling of the temporary directory cleanup. http://python-distribute.org/distribute_setup.py was marked as Malicious by 1 engine in VT. https://www.virustotal.com/gui/url/3dce83785eafd47d40edd58b58c82593994cd409fc76351033486881fe943c36

test-za-sec-psh

1.0.0

Removed from npm

Blocked by Socket

The script exhibits clear signs of malicious behavior by collecting and sending sensitive system information to an external server. The use of base64 encoding, while not strong obfuscation, is a technique often used to slightly obscure data. The external server communication poses a significant security risk.

Live on npm for 34 minutes before removal. Socket users were protected even while the package was live.

jupyter-widgets

99.10.9

by wjv4s320

Removed from npm

Blocked by Socket

The code is designed to collect and send sensitive information to a remote server without the user's knowledge or consent. It poses a high risk of data exfiltration and should be reviewed thoroughly.

Live on npm for 41 minutes before removal. Socket users were protected even while the package was live.

angieslist-styleguide

6.693.3

by hangi

Removed from npm

Blocked by Socket

The code exhibits behavior consistent with data exfiltration by sending environment variables to a suspicious domain. This poses a significant security risk due to potential exposure of sensitive information.

Live on npm for 4 hours and 7 minutes before removal. Socket users were protected even while the package was live.

baby-loris

1.0.2

by kaimkamboj

Removed from npm

Blocked by Socket

The code reads sensitive system files including '/etc/passwd' and collects system information such as the home directory, hostname, username, DNS servers, and package details. This data is sent via an HTTPS POST request to a remote server at 'juha9he7uuz32n81la0aui0kqbw2kt8i[.]oastify[.]com' without user consent, posing a significant security risk due to unauthorized data exfiltration.

Live on npm for 1 day, 3 hours and 8 minutes before removal. Socket users were protected even while the package was live.

@zitterorg/laudantium-rerum

2.4.44

by loandinhb931

Live on npm

Blocked by Socket

Malicious code in @zitterorg/laudantium-rerum (npm) Source: ghsa-malware (e45ff91dd83cc149d7abc8c6fb2c74e3509aa341e23c72cfac0a34868a4e2637) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.

simweb

1.3.4

by delxlu

Removed from npm

Blocked by Socket

The code sets up a WebSocket proxy server that decrypts incoming messages using a secret key and forwards them to a remote server. However, it has potential security risks such as the use of potentially hard-coded encryption key and the lack of input validation and authentication/authorization checks. It is important to review and enhance the security measures before using this code in a production environment.

Live on npm for 44 days and 49 minutes before removal. Socket users were protected even while the package was live.

es6shsm

0.0.1-security.2

by npm

Live on npm

Blocked by Socket

Malicious code in es6shsm (npm) Source: ghsa-malware (532e251435e5aa43412f0a3d67927aad3b0df8a7a31d174bc651cda37d917934) Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Known malware

Possible typosquat attack

NPM Shrinkwrap

Git dependency

HTTP dependency

Suspicious Stars on GitHub

Protestware or potentially unwanted behavior

Unstable ownership

AI-detected potential malware

Obfuscated code

20 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Even more security team love
Book a DemoLearn more

Why teams choose Socket

Pro-active security

Depend on Socket to prevent malicious open source dependencies from infiltrating your app.

Easy to install

Install the Socket GitHub App in just 2 clicks and get protected today.

Comprehensive open source protection

Block 70+ issues in open source code, including malware, typo-squatting, hidden code, misleading packages, permission creep, and more.

Develop faster

Reduce work by surfacing actionable security information directly in GitHub. Empower developers to make better decisions.

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Dec 14, 2023

Hijacked cryptocurrency library adds malware

Widely-used library in cryptocurrency frontend was compromised to include wallet-draining code, following the hijacking of NPM account credentials via phishing.

Jan 06, 2022

Maintainer intentionally adds malware

Rogue maintainer sabotages his own open source package with 100M downloads/month, notably breaking Amazon's AWS SDK.

Nov 15, 2021

npm discovers a platform vulnerability allowing unauthorized publishing of any package

Attackers could publish new versions of any npm package without authorization for multiple years.

Oct 22, 2021

Hijacked package adds cryptominers and password-stealing malware

Multiple packages with 30M downloads/month are hijacked and publish malicious versions directly into the software supply chain.

Nov 26, 2018

Package hijacked adding organization specific backdoors

Obfuscated malware added to a dependency which targeted a single company, went undetected for over a week, and made it into their production build.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub AppBook a Demo

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles