Launch Week Day 5: Introducing Reachability for PHP.Learn More
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.5

We protect you from vulnerable and malicious packages

plumber-agent

1.0.17

Live on pypi

Blocked by Socket

This module is a high-risk command dispatcher that reads untrusted JSON from a filesystem queue and executes the 'command' field using unrestricted Python exec() with the nuke API available. If the command file (or its path) can be influenced by an attacker, it effectively functions as an RCE/backdoor mechanism. It also captures and returns stdout and logs command previews/tracebacks, increasing the likelihood of data exposure. No explicit malicious payload is present in this fragment, but the design itself is strongly suspicious and dangerous for any dependency shipped to untrusted environments.

gsd-pi

2.78.1-dev.a7b6e59b7

by glittercowboy

Live on npm

Blocked by Socket

This module implements a remote terminal streaming API: it can spawn an interactive shell/command via node-pty based on URL parameters and streams the PTY output back to the client over SSE. Although it includes an allowlist for command selection, the command parameter is optional and defaults to spawning a shell (process.env.SHELL/common shells). It also uses a dynamic require fallback for native module loading and uses a client-controlled id to manage global PTY sessions. If the surrounding application does not enforce strong authentication/authorization and strict abuse controls, this constitutes an extremely high security risk consistent with malicious or backdoor-like functionality.

devduck

1.15.2

Live on pypi

Blocked by Socket

This fragment provides a high-capability browser automation/inspection bridge with multiple high-risk primitives: it can navigate to attacker-supplied URLs, inject and run page-context scripts, execute caller-provided code via eval, read cookies, harvest large DOM content, and attach the Chrome debugger to simulate user input or send arbitrary CDP commands. If an attacker can reach the runtime messaging interface or if external WebSocket/native connectors forward commands/results, the module can enable session/DOM data theft and arbitrary in-page manipulation. Even without proving exfiltration/network behavior in the snippet, the capability set warrants security review, strict message authentication/authorization, and permission minimization/allowlisting.

ghbomber

1.0.3

by ghostsenderserver

Live on npm

Blocked by Socket

This fragment is highly suspicious and consistent with an automated identity/SSO enumeration tool: it sends enumerated usernames to a remote HTTP service, interprets existence/federation redirect metadata, and writes categorized 'hit'/'invalid' results into append-only local text files. The heavy obfuscation and provider-specific branching increase confidence that the code is intended for operational probing rather than benign functionality.

@pyme-web/ui-widget

99.0.4

by m0ntanatony

Live on npm

Blocked by Socket

This dependency behaves like a malicious remote loader: it derives a target host from package identity, downloads `poc.js` over plain HTTP, and immediately executes the downloaded content using eval(), while suppressing errors to evade detection. Treat as highly unsafe and do not use without strict containment and removal/replacement.

aws-toolkit-telemetry-definitions

99.0.2

Live on cargo

Blocked by Socket

This fragment is a clear exfiltration/backdoor-style payload: it fingerprints the local environment (hostname and username) by executing system commands and then sends the data to a hardcoded Telegram bot endpoint via `curl`. The explicit “Dependency Confusion / RCE Verified” messaging strongly aligns with malicious proof-of-compromise behavior. Treat the package/module containing this code as highly unsafe and do not deploy it without thorough isolation and review of surrounding code.

@voidrco/playwright

1.21.5

by mateus.hortencio-voidr

Live on npm

Blocked by Socket

High supply-chain risk. This module behaves like an obfuscated agent/orchestrator client: it authenticates to environment-configured remote endpoints, encrypts/decrypts payloads, persists encrypted token/config cache to disk, supports extensive upload/download (streaming + chunking), and contains client methods that call execution/exec-style endpoints. While the fragment does not conclusively prove harmful local actions, the remote execution capability combined with file transfer and evasion techniques makes it likely that the package can be used for unauthorized remote orchestration or data movement. Further review should focus on the exact execution endpoints, authorization model, path validation for uploads/downloads, and whether package installation/CLI defaults automatically trigger these flows.

smolerclaw

1.10.1

by ktfth

Live on npm

Blocked by Socket

This module is not a benign utility library; it bundles a high-risk Windows agent toolkit. It includes (1) local PowerShell execution with execution-policy bypass semantics, (2) persistence via scheduled tasks/jobs, and (3) sensitive user surveillance primitives (clipboard access with OCR and screen/window context enumeration). It also persists data to disk and serves a browser UI with potential DOM injection risk. Treat as malware-grade supply-chain risk: only use with strong isolation (sandbox/allowlisting) and strict control over tool exposure, or avoid entirely.

nolimit-x

1.0.140

by nolimitaworkspace

Live on npm

Blocked by Socket

This module is a high-risk offensive tooling component: it reads cryptographic material from disk, performs DNS TXT reconnaissance to score target domains, selects replay/direct/hybrid offensive flows, and generates forged DKIM-Signature headers plus spoofed email bodies containing phishing/smuggling-style HTML/script content. The combination of authentication forgery, automated targeting logic, and injected payload generation is consistent with malware/attack tooling rather than legitimate DKIM utilities. Do not use in a supply chain without isolation and strong justification.

plumber-agent

1.0.17

Live on pypi

Blocked by Socket

This module implements a high-risk file-driven execution mechanism inside Blender that reads a JSON command file and executes the 'command' field verbatim using Python exec() without validation or sandboxing. It exposes Blender’s bpy API to the executed code, captures stdout, writes results/errors to disk, and deletes the consumed command file. If an attacker can write or tamper with the command_file (or misconfigure file paths), this becomes an effective arbitrary code execution channel with strong feedback via returned output and logged tracebacks. No obvious cryptomining or hardcoded credentials are visible in the provided fragment; the primary concern is the exec-based design pattern.

renance-dt

3.0.0

Live on pypi

Blocked by Socket

This module is highly suspicious due to explicit Windows WiFi credential recovery (netsh wlan ... key=clear) and direct printing of the extracted WiFi passwords/keys, constituting credential theft/disclosure. It also adds persistence-like PATH modification (Unix rc files / Windows registry user Path) and includes runtime pip upgrade functionality that can execute untrusted code from the supply chain. While several functions are ordinary system introspection, the wifi() behavior and persistence/supply-chain elements materially increase the risk. Treat the package as unsafe unless thoroughly sandboxed and its packaging provenance is independently verified.

@pyme-web/ui-widget

99.0.4

by m0ntanatony

Live on npm

Blocked by Socket

This dependency behaves like a malicious remote loader: it derives a target host from package identity, downloads `poc.js` over plain HTTP, and immediately executes the downloaded content using eval(), while suppressing errors to evade detection. Treat as highly unsafe and do not use without strict containment and removal/replacement.

devduck

1.15.3

Live on pypi

Blocked by Socket

This fragment provides a high-capability browser automation/inspection bridge with multiple high-risk primitives: it can navigate to attacker-supplied URLs, inject and run page-context scripts, execute caller-provided code via eval, read cookies, harvest large DOM content, and attach the Chrome debugger to simulate user input or send arbitrary CDP commands. If an attacker can reach the runtime messaging interface or if external WebSocket/native connectors forward commands/results, the module can enable session/DOM data theft and arbitrary in-page manipulation. Even without proving exfiltration/network behavior in the snippet, the capability set warrants security review, strict message authentication/authorization, and permission minimization/allowlisting.

ghbomber

1.0.3

by ghostsenderserver

Live on npm

Blocked by Socket

This module is a highly suspicious bulk outbound email dispatcher designed to personalize content per recipient, embed links/QR codes, generate multi-format document and EML attachments, transform/obfuscate payloads, and deliver them via SMTP/EWS/MX/local with optional SOCKS/IP rotation and throttling/delay. Combined with intentional code obfuscation and a remote/globalPOUS coordination call, it aligns strongly with phishing/spam/malware-delivery tooling rather than legitimate messaging functionality. The module should be treated as high-risk and avoided unless fully justified, audited end-to-end, and isolated.

robase-ui

2.3.0

Removed from pypi

Blocked by Socket

The code is a highly suspicious supply-chain installer backdoor pattern: it hooks setuptools installation and spawns PowerShell with hidden-window and execution-policy bypass flags, passing an intended command string. The specific payload content is not observable in the provided snippet (missing/incomplete `powershell_cmd`), but the execution mechanism and evasion techniques strongly indicate malicious intent. Treat the package as unsafe and inspect the full, complete installed artifact to determine the actual `powershell_cmd` and its actions.

Live on pypi for 7 minutes before removal. Socket users were protected even while the package was live.

dodex-vertx

4.1.4

by daveo

Live on npm

Blocked by Socket

This module is highly security-sensitive. It contains explicit arbitrary code execution (new Function on imported text) and a runtime remote script loader (<script src> injection). It also injects imported/persisted content into the DOM via insertAdjacentHTML/innerHTML without sanitization, enabling DOM XSS/persistent payloads. Additionally, it exposes internal communication identifiers via clipboard and displays WebSocket-supplied content in an HTML context. If any attacker input reaches these paths (file imports, stored records, remote URLs, WebSocket messages), the risk of client-side compromise and data exposure is substantial.

ghbomber

1.0.3

by ghostsenderserver

Live on npm

Blocked by Socket

This module behaves like an obfuscation/payload packer: it compresses caller-provided content with zlib, transforms it through custom binary/chunk/position encoding with randomized keys, and returns a dynamically constructed JavaScript decoder/loader string. The generated code includes loader-like indicators (external path pattern and DOM-manipulation keywords), which is consistent with malicious droppers or supply-chain payload concealment. No direct network or execution occurs inside this snippet, but the produced artifact is suitable for injection/execution by downstream consumers, making it high-risk for a software supply chain.

unique-string-64

1.0.2

by jason3

Live on npm

Blocked by Socket

This module returns a 32-character random string, but it contains a gated, dormant dynamic execution gadget that can resolve to globalThis.eval and execute a caller-supplied payload if the inner function is invoked. It also includes an unauthenticated AES-256-CBC decrypt helper with hardcoded key material (present but not used in the shown export). The dynamic eval gadget is the key supply-chain security concern.

nolimit-x

1.0.140

by nolimitaworkspace

Live on npm

Blocked by Socket

This fragment is highly suspicious and strongly abuse-oriented: it obfuscates strings at runtime, fabricates “signed”/DKIM-like email headers and raw MIME payloads, creates SMTP transports using configuration-supplied credentials, and forwards the crafted messages to caller-supplied recipient addresses via nodemailer. That combination is consistent with email impersonation/replay/spoofing capability. While the snippet does not show system compromise primitives beyond SMTP sending, the external effect (sending spoofed emails) is directly aligned with malicious phishing/replay activity.

plumber-agent

1.0.17

Live on pypi

Blocked by Socket

This module is extremely dangerous by design because it executes Python code read verbatim from an external JSON command file using exec() with full process privileges. It also writes logs and response files that may leak sensitive data (captured stdout and full tracebacks) and deletes the command queue file afterward. Additional risk arises from unrestricted file path handling via CLI arguments. Unless the command_file and file paths are strongly access-controlled and the environment is tightly sandboxed, this constitutes a file-based RCE/control-channel pattern suitable for malware or sabotage. Confidence is reduced only because the provided snippet appears truncated at the end, preventing verification of any behavior after the fragment.

@pyme-web/ui-base

99.0.4

by m0ntanatony

Live on npm

Blocked by Socket

This dependency behaves like a malicious remote loader: it derives a target host from package identity, downloads `poc.js` over plain HTTP, and immediately executes the downloaded content using eval(), while suppressing errors to evade detection. Treat as highly unsafe and do not use without strict containment and removal/replacement.

lucterios

2.7.8.26041809

Live on pypi

Blocked by Socket

Overall security posture of this excerpt is concerning due to a direct arbitrary-code execution sink (new Function over component-provided JavaScript) and multiple HTML injection/HTML-ingestion sinks (Vue innerHTML and Quill dangerouslyPasteHTML). If any of the relevant configuration/data (especially component.javascript or HTML-bearing message/help content) can be influenced by an attacker via remote configuration, stored content, or compromised backend/admin workflows, the code can function as an in-browser backdoor and XSS-capable payload runner. Axios-like networking and cookie/header logic appear functionally standard, but they increase impact by enabling malicious scripts to make authenticated requests and propagate tokens once code execution/XSS is achieved.

ghbomber

1.0.9

by ghostsenderserver

Live on npm

Blocked by Socket

High-risk supply-chain indicators are present in this module. It contains explicit runtime JavaScript obfuscation that injects eval-based loaders into HTML (Le()) and redirect/document-write behavior (Ce()), and it also executes host commands from environment variables (GETHELP/UPDCLI) via child_process.exec. The module then renders the (possibly modified) HTML in Puppeteer and packages outputs into deliverable artifacts, which increases the practical impact of the injected payloads. Treat this code as potentially malicious content-delivery tooling and perform deeper review of the parent package and runtime configuration/flags before use.

tianlong-toolkit

1.1.0

Live on pypi

Blocked by Socket

This fragment contains multiple high-risk primitives commonly seen in malicious tooling: arbitrary Python execution (exec), arbitrary shell execution (subprocess with shell=True), uncontrolled filesystem reads from a user-influenced path component (/data/{filename}), and caller-controlled outbound HTTP requests plus internal localhost probing. Combined with a hardcoded credential-like secret, the overall capability set is strongly consistent with backdoor-like behavior. Even though one line in fetch_url appears syntactically/semantically incorrect (requests.get(url).tex), the dangerous intent and core execution/network/filesystem primitives are present.

torc

0.24.1

Live on cargo

Blocked by Socket

This fragment is a high-impact destructive SQL statement that would delete a specific table if executed. With no surrounding migration/admin context shown, it should be treated as suspicious/dangerous for a software package dependency supply chain. Confirm whether it is only used in controlled, authenticated migration tooling; otherwise, it represents a serious risk of data loss and potential sabotage.

plumber-agent

1.0.17

Live on pypi

Blocked by Socket

This module is a high-risk command dispatcher that reads untrusted JSON from a filesystem queue and executes the 'command' field using unrestricted Python exec() with the nuke API available. If the command file (or its path) can be influenced by an attacker, it effectively functions as an RCE/backdoor mechanism. It also captures and returns stdout and logs command previews/tracebacks, increasing the likelihood of data exposure. No explicit malicious payload is present in this fragment, but the design itself is strongly suspicious and dangerous for any dependency shipped to untrusted environments.

gsd-pi

2.78.1-dev.a7b6e59b7

by glittercowboy

Live on npm

Blocked by Socket

This module implements a remote terminal streaming API: it can spawn an interactive shell/command via node-pty based on URL parameters and streams the PTY output back to the client over SSE. Although it includes an allowlist for command selection, the command parameter is optional and defaults to spawning a shell (process.env.SHELL/common shells). It also uses a dynamic require fallback for native module loading and uses a client-controlled id to manage global PTY sessions. If the surrounding application does not enforce strong authentication/authorization and strict abuse controls, this constitutes an extremely high security risk consistent with malicious or backdoor-like functionality.

devduck

1.15.2

Live on pypi

Blocked by Socket

This fragment provides a high-capability browser automation/inspection bridge with multiple high-risk primitives: it can navigate to attacker-supplied URLs, inject and run page-context scripts, execute caller-provided code via eval, read cookies, harvest large DOM content, and attach the Chrome debugger to simulate user input or send arbitrary CDP commands. If an attacker can reach the runtime messaging interface or if external WebSocket/native connectors forward commands/results, the module can enable session/DOM data theft and arbitrary in-page manipulation. Even without proving exfiltration/network behavior in the snippet, the capability set warrants security review, strict message authentication/authorization, and permission minimization/allowlisting.

ghbomber

1.0.3

by ghostsenderserver

Live on npm

Blocked by Socket

This fragment is highly suspicious and consistent with an automated identity/SSO enumeration tool: it sends enumerated usernames to a remote HTTP service, interprets existence/federation redirect metadata, and writes categorized 'hit'/'invalid' results into append-only local text files. The heavy obfuscation and provider-specific branching increase confidence that the code is intended for operational probing rather than benign functionality.

@pyme-web/ui-widget

99.0.4

by m0ntanatony

Live on npm

Blocked by Socket

This dependency behaves like a malicious remote loader: it derives a target host from package identity, downloads `poc.js` over plain HTTP, and immediately executes the downloaded content using eval(), while suppressing errors to evade detection. Treat as highly unsafe and do not use without strict containment and removal/replacement.

aws-toolkit-telemetry-definitions

99.0.2

Live on cargo

Blocked by Socket

This fragment is a clear exfiltration/backdoor-style payload: it fingerprints the local environment (hostname and username) by executing system commands and then sends the data to a hardcoded Telegram bot endpoint via `curl`. The explicit “Dependency Confusion / RCE Verified” messaging strongly aligns with malicious proof-of-compromise behavior. Treat the package/module containing this code as highly unsafe and do not deploy it without thorough isolation and review of surrounding code.

@voidrco/playwright

1.21.5

by mateus.hortencio-voidr

Live on npm

Blocked by Socket

High supply-chain risk. This module behaves like an obfuscated agent/orchestrator client: it authenticates to environment-configured remote endpoints, encrypts/decrypts payloads, persists encrypted token/config cache to disk, supports extensive upload/download (streaming + chunking), and contains client methods that call execution/exec-style endpoints. While the fragment does not conclusively prove harmful local actions, the remote execution capability combined with file transfer and evasion techniques makes it likely that the package can be used for unauthorized remote orchestration or data movement. Further review should focus on the exact execution endpoints, authorization model, path validation for uploads/downloads, and whether package installation/CLI defaults automatically trigger these flows.

smolerclaw

1.10.1

by ktfth

Live on npm

Blocked by Socket

This module is not a benign utility library; it bundles a high-risk Windows agent toolkit. It includes (1) local PowerShell execution with execution-policy bypass semantics, (2) persistence via scheduled tasks/jobs, and (3) sensitive user surveillance primitives (clipboard access with OCR and screen/window context enumeration). It also persists data to disk and serves a browser UI with potential DOM injection risk. Treat as malware-grade supply-chain risk: only use with strong isolation (sandbox/allowlisting) and strict control over tool exposure, or avoid entirely.

nolimit-x

1.0.140

by nolimitaworkspace

Live on npm

Blocked by Socket

This module is a high-risk offensive tooling component: it reads cryptographic material from disk, performs DNS TXT reconnaissance to score target domains, selects replay/direct/hybrid offensive flows, and generates forged DKIM-Signature headers plus spoofed email bodies containing phishing/smuggling-style HTML/script content. The combination of authentication forgery, automated targeting logic, and injected payload generation is consistent with malware/attack tooling rather than legitimate DKIM utilities. Do not use in a supply chain without isolation and strong justification.

plumber-agent

1.0.17

Live on pypi

Blocked by Socket

This module implements a high-risk file-driven execution mechanism inside Blender that reads a JSON command file and executes the 'command' field verbatim using Python exec() without validation or sandboxing. It exposes Blender’s bpy API to the executed code, captures stdout, writes results/errors to disk, and deletes the consumed command file. If an attacker can write or tamper with the command_file (or misconfigure file paths), this becomes an effective arbitrary code execution channel with strong feedback via returned output and logged tracebacks. No obvious cryptomining or hardcoded credentials are visible in the provided fragment; the primary concern is the exec-based design pattern.

renance-dt

3.0.0

Live on pypi

Blocked by Socket

This module is highly suspicious due to explicit Windows WiFi credential recovery (netsh wlan ... key=clear) and direct printing of the extracted WiFi passwords/keys, constituting credential theft/disclosure. It also adds persistence-like PATH modification (Unix rc files / Windows registry user Path) and includes runtime pip upgrade functionality that can execute untrusted code from the supply chain. While several functions are ordinary system introspection, the wifi() behavior and persistence/supply-chain elements materially increase the risk. Treat the package as unsafe unless thoroughly sandboxed and its packaging provenance is independently verified.

@pyme-web/ui-widget

99.0.4

by m0ntanatony

Live on npm

Blocked by Socket

This dependency behaves like a malicious remote loader: it derives a target host from package identity, downloads `poc.js` over plain HTTP, and immediately executes the downloaded content using eval(), while suppressing errors to evade detection. Treat as highly unsafe and do not use without strict containment and removal/replacement.

devduck

1.15.3

Live on pypi

Blocked by Socket

This fragment provides a high-capability browser automation/inspection bridge with multiple high-risk primitives: it can navigate to attacker-supplied URLs, inject and run page-context scripts, execute caller-provided code via eval, read cookies, harvest large DOM content, and attach the Chrome debugger to simulate user input or send arbitrary CDP commands. If an attacker can reach the runtime messaging interface or if external WebSocket/native connectors forward commands/results, the module can enable session/DOM data theft and arbitrary in-page manipulation. Even without proving exfiltration/network behavior in the snippet, the capability set warrants security review, strict message authentication/authorization, and permission minimization/allowlisting.

ghbomber

1.0.3

by ghostsenderserver

Live on npm

Blocked by Socket

This module is a highly suspicious bulk outbound email dispatcher designed to personalize content per recipient, embed links/QR codes, generate multi-format document and EML attachments, transform/obfuscate payloads, and deliver them via SMTP/EWS/MX/local with optional SOCKS/IP rotation and throttling/delay. Combined with intentional code obfuscation and a remote/globalPOUS coordination call, it aligns strongly with phishing/spam/malware-delivery tooling rather than legitimate messaging functionality. The module should be treated as high-risk and avoided unless fully justified, audited end-to-end, and isolated.

robase-ui

2.3.0

Removed from pypi

Blocked by Socket

The code is a highly suspicious supply-chain installer backdoor pattern: it hooks setuptools installation and spawns PowerShell with hidden-window and execution-policy bypass flags, passing an intended command string. The specific payload content is not observable in the provided snippet (missing/incomplete `powershell_cmd`), but the execution mechanism and evasion techniques strongly indicate malicious intent. Treat the package as unsafe and inspect the full, complete installed artifact to determine the actual `powershell_cmd` and its actions.

Live on pypi for 7 minutes before removal. Socket users were protected even while the package was live.

dodex-vertx

4.1.4

by daveo

Live on npm

Blocked by Socket

This module is highly security-sensitive. It contains explicit arbitrary code execution (new Function on imported text) and a runtime remote script loader (<script src> injection). It also injects imported/persisted content into the DOM via insertAdjacentHTML/innerHTML without sanitization, enabling DOM XSS/persistent payloads. Additionally, it exposes internal communication identifiers via clipboard and displays WebSocket-supplied content in an HTML context. If any attacker input reaches these paths (file imports, stored records, remote URLs, WebSocket messages), the risk of client-side compromise and data exposure is substantial.

ghbomber

1.0.3

by ghostsenderserver

Live on npm

Blocked by Socket

This module behaves like an obfuscation/payload packer: it compresses caller-provided content with zlib, transforms it through custom binary/chunk/position encoding with randomized keys, and returns a dynamically constructed JavaScript decoder/loader string. The generated code includes loader-like indicators (external path pattern and DOM-manipulation keywords), which is consistent with malicious droppers or supply-chain payload concealment. No direct network or execution occurs inside this snippet, but the produced artifact is suitable for injection/execution by downstream consumers, making it high-risk for a software supply chain.

unique-string-64

1.0.2

by jason3

Live on npm

Blocked by Socket

This module returns a 32-character random string, but it contains a gated, dormant dynamic execution gadget that can resolve to globalThis.eval and execute a caller-supplied payload if the inner function is invoked. It also includes an unauthenticated AES-256-CBC decrypt helper with hardcoded key material (present but not used in the shown export). The dynamic eval gadget is the key supply-chain security concern.

nolimit-x

1.0.140

by nolimitaworkspace

Live on npm

Blocked by Socket

This fragment is highly suspicious and strongly abuse-oriented: it obfuscates strings at runtime, fabricates “signed”/DKIM-like email headers and raw MIME payloads, creates SMTP transports using configuration-supplied credentials, and forwards the crafted messages to caller-supplied recipient addresses via nodemailer. That combination is consistent with email impersonation/replay/spoofing capability. While the snippet does not show system compromise primitives beyond SMTP sending, the external effect (sending spoofed emails) is directly aligned with malicious phishing/replay activity.

plumber-agent

1.0.17

Live on pypi

Blocked by Socket

This module is extremely dangerous by design because it executes Python code read verbatim from an external JSON command file using exec() with full process privileges. It also writes logs and response files that may leak sensitive data (captured stdout and full tracebacks) and deletes the command queue file afterward. Additional risk arises from unrestricted file path handling via CLI arguments. Unless the command_file and file paths are strongly access-controlled and the environment is tightly sandboxed, this constitutes a file-based RCE/control-channel pattern suitable for malware or sabotage. Confidence is reduced only because the provided snippet appears truncated at the end, preventing verification of any behavior after the fragment.

@pyme-web/ui-base

99.0.4

by m0ntanatony

Live on npm

Blocked by Socket

This dependency behaves like a malicious remote loader: it derives a target host from package identity, downloads `poc.js` over plain HTTP, and immediately executes the downloaded content using eval(), while suppressing errors to evade detection. Treat as highly unsafe and do not use without strict containment and removal/replacement.

lucterios

2.7.8.26041809

Live on pypi

Blocked by Socket

Overall security posture of this excerpt is concerning due to a direct arbitrary-code execution sink (new Function over component-provided JavaScript) and multiple HTML injection/HTML-ingestion sinks (Vue innerHTML and Quill dangerouslyPasteHTML). If any of the relevant configuration/data (especially component.javascript or HTML-bearing message/help content) can be influenced by an attacker via remote configuration, stored content, or compromised backend/admin workflows, the code can function as an in-browser backdoor and XSS-capable payload runner. Axios-like networking and cookie/header logic appear functionally standard, but they increase impact by enabling malicious scripts to make authenticated requests and propagate tokens once code execution/XSS is achieved.

ghbomber

1.0.9

by ghostsenderserver

Live on npm

Blocked by Socket

High-risk supply-chain indicators are present in this module. It contains explicit runtime JavaScript obfuscation that injects eval-based loaders into HTML (Le()) and redirect/document-write behavior (Ce()), and it also executes host commands from environment variables (GETHELP/UPDCLI) via child_process.exec. The module then renders the (possibly modified) HTML in Puppeteer and packages outputs into deliverable artifacts, which increases the practical impact of the injected payloads. Treat this code as potentially malicious content-delivery tooling and perform deeper review of the parent package and runtime configuration/flags before use.

tianlong-toolkit

1.1.0

Live on pypi

Blocked by Socket

This fragment contains multiple high-risk primitives commonly seen in malicious tooling: arbitrary Python execution (exec), arbitrary shell execution (subprocess with shell=True), uncontrolled filesystem reads from a user-influenced path component (/data/{filename}), and caller-controlled outbound HTTP requests plus internal localhost probing. Combined with a hardcoded credential-like secret, the overall capability set is strongly consistent with backdoor-like behavior. Even though one line in fetch_url appears syntactically/semantically incorrect (requests.get(url).tex), the dangerous intent and core execution/network/filesystem primitives are present.

torc

0.24.1

Live on cargo

Blocked by Socket

This fragment is a high-impact destructive SQL statement that would delete a specific table if executed. With no surrounding migration/admin context shown, it should be treated as suspicious/dangerous for a software package dependency supply chain. Confirm whether it is only used in controlled, authenticated migration tooling; otherwise, it represents a serious risk of data loss and potential sabotage.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Git dependency

GitHub dependency

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

Telemetry

Protestware or potentially unwanted behavior

Unstable ownership

55 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a Demo

Questions? Call us at (844) SOCKET-0

Read the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles