Launch Week Day 5: Introducing Reachability for PHP.Learn More
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.5

We protect you from vulnerable and malicious packages

amaru-ledger

0.1.1

Live on cargo

Blocked by Socket

The fragment is highly suspicious: a large obfuscated/binary-looking payload with embedded domain references and potential command indicators. While not conclusive on its own, the combination suggests a potential hidden payload or backdoor vector that could be activated upon deobfuscation or decoding. Treat as a high-risk indicator and require sanitized, decodable samples or metadata before deeming it safe.

@joystick.js/cli-canary

0.0.0-canary.1705

by cheatcodetuts

Live on npm

Blocked by Socket

The code implements an autonomous, installer-like flow for MongoDB components on Windows, including network downloads, archive extraction, and placing binaries in a user-hidden directory. This behavior presents significant security and supply-chain risks due to lack of user consent, absence of integrity checks, and potential persistence. It should be reviewed for necessity, replaced with explicit user prompts and verifiable integrity checks (digests/signatures), and ideally moved to a clearly trusted installer process rather than a library-like module.

affinequant

99.6

Live on pypi

Blocked by Socket

The code collects sensitive system information and sends it to external URLs without user consent. The use of base64 encoding for URLs and MAC addresses suggests an attempt to obfuscate the code's intent. This behavior is consistent with data exfiltration, a common malicious activity, posing a significant security risk.

pyhtools

2.2.4

Live on pypi

Blocked by Socket

This code implements a straightforward HTTP backdoor/C2 client: it polls a remote URL for commands, executes them locally via the system shell, and posts outputs and exceptions back to the same endpoint. It provides unauthenticated remote code execution, directory control, and data exfiltration over cleartext HTTP. The component is malicious and should not be executed on production systems; any instance found should be treated as a compromise and investigated in a sandboxed environment.

swarm-safety

1.3.1

Live on pypi

Blocked by Socket

This module is explicitly adversarial and returns actionable suggestions that, if consumed and executed without strict validation and authorization, can lead to privilege escalation, unauthorized financial actions, or disruptive incident-response behavior. The file does not itself perform I/O or network activity, but it is a dangerous supply-chain component: treat it as malicious/instrumental in adversarial steering and do not allow automated execution of its outputs without strong governance (human review, authorization checks, parameter validation, and mapping of endpoints to a safe execution policy).

sandbox-checkout-package

0.1.99

by kohlbyrd

Live on npm

Blocked by Socket

This script is malicious: it is a targeted checkout-hijacking implant for Shopify-like stores. It harvests cart contents and discount codes by fetching /cart.js, exfiltrates them to hardcoded local endpoints, and forcibly redirects or prevents legitimate checkout flows. It globally overrides navigation and network APIs to make the interception robust. Remove the script, audit recent package updates and sources that injected it, and investigate any local services (127.0.0.1:3000/3001) or proxy agents that may have received the posted data.

@xunlie/vue-context-menu

1.0.3

by xunlie

Live on npm

Blocked by Socket

This script appears to be obfuscated, as it is using Base64 encoding to execute a command. The command is running a local script using the 'child_process' module. The contents of the script should be reviewed carefully to ensure that it is not malicious in nature.

meditek

1.0.1

by jodx00

Removed from npm

Blocked by Socket

The code collects and sends sensitive system information to a potentially malicious domain, which is a significant privacy and security concern. The behavior aligns with data exfiltration patterns, indicating a high risk of malicious intent.

Live on npm for 15 days, 10 hours and 4 minutes before removal. Socket users were protected even while the package was live.

licensehelper.core

1.0.11

by LicenseHelper.Core

Live on nuget

Blocked by Socket

The code is strongly obfuscated and exhibits multiple high-risk behaviors typical of loaders/packers and many malware families: embedded resource decryption, RSA signature verification, dynamic method emission that executes code from decrypted resources, hidden process creation, and registry writes to HKLM. There is no benign justification in a typical library for these combined behaviors. Treat this component as high-risk: if not from a verified protector vendor with documented behavior, do not include it in your supply chain. Perform full offline analysis and dynamic sandboxing of the embedded resources, and inspect any registry keys written. Consider blocking at build/CI until provenance and intent are validated.

io.github.reajason:generator

2.6.1

Live on maven

Blocked by Socket

The code implements a dynamic class loading payload mechanism triggered by specific HTTP headers and parameters, enabling remote execution of arbitrary code supplied by a client. This constitutes a backdoor-like behavior and a severe security risk if exposed. It is a high-confidence indicator of malicious behavior (remote code execution backdoor) and should be treated as extremely dangerous in any public or shipped package.

asifjamali

28.9.3

Removed from pypi

Blocked by Socket

The script poses a moderate security risk due to its ability to download and execute code from external sources, delete files, and manage proxy lists. The hardcoded IP address and file deletion functionality are concerning, but there is no explicit evidence of malicious intent.

Live on pypi for 4 minutes before removal. Socket users were protected even while the package was live.

plengauer/thoth

8d6ad1a6961085c99b929d4d4682ca4b43bd48a3

Live on actions

Blocked by Socket

The code unconditionally executes a packaged shell script on Linux at import time with inherited stdio and package-directory working directory. The JS itself doesn't contain explicit malicious payloads, but this pattern is a high supply-chain risk: it grants any contents of inject_and_init.sh the ability to execute arbitrary commands with the user's privileges, interact with the terminal, read environment variables, and access the filesystem and network. Treat the package as potentially dangerous unless you can audit or control the script contents and provenance. Recommend removing automatic execution, adding explicit opt-in APIs, verifying script integrity (signatures/hashes), avoiding inherited stdio, and performing existence and content checks before execution.

abstract-database

0.0.2.94

Live on pypi

Blocked by Socket

The code in the flagged file explicitly reads a local file from a fixed system path (/home/joben/Desktop/testsol/abstract_it.py) and transmits its contents via an HTTP request to a Discord webhook. The target URL is hardcoded as https://discordapp[.]com/api/webhooks/1278595755812327424/3xvzS30Bx8bOhooNJeY9gnYj2KjFb2-ZfV2rHpBdkS71tuibNeu56_mRFE38MrmQRa_j, with the embedded token included in the URL. This behavior is characteristic of malware designed for data exfiltration, as it automatically sends potentially sensitive file content to an external service without user consent.

serve-sim

0.0.5

by evanbacon

Live on npm

Blocked by Socket

This module is critically unsafe for any environment where untrusted parties can reach the server. It exposes an HTTP `POST ${basePath}/exec` endpoint that performs arbitrary host command execution using `child_process.exec` with client-supplied input. It also streams simulator logs/appstate via `xcrun` and serves a large embedded JS payload that likely drives automation. Additional impact includes host process termination and deletion of local state files based on parsed temp JSON. Overall, the design matches a high-risk backdoor/RCE-capable supply-chain component rather than a safe simulator preview tool.

taichi-nightly

0.2.0

Live on pypi

Blocked by Socket

This code contains clear backdoor-like behavior: plaintext hardcoded Gmail credentials and automatic registration of callbacks that send emails with hostname and task identifiers to an external recipient. That enables covert data exfiltration and remote notification without explicit user consent. The component should be considered malicious or at minimum unacceptable for inclusion in trusted dependencies until credentials are removed and opt-in controls and secure secret handling are implemented.

skiko-wasm-js

10.0.1

by cybershree3

Live on npm

Blocked by Socket

This install script collects environment and user information from the host and posts it to an external server during installation. That is direct data exfiltration / unauthorized telemetry and poses a high privacy and security risk. It may be used for fingerprinting or as a precursor to further malicious actions. Review and remove such behavior or block network access during install; inspect repository history and publisher trustworthiness.

analytika-analytika-utils

6.350.0

by hcarme

Removed from npm

Blocked by Socket

The code sends environment variables to a potentially suspicious domain, indicating data exfiltration. This is a clear sign of malicious behavior.

Live on npm for 2 hours and 52 minutes before removal. Socket users were protected even while the package was live.

github.com/milvus-io/milvus

v0.10.3-0.20211022124910-5c589244205b

Live on go

Blocked by Socket

This code implements an insecure, unauthenticated RPC mechanism that allows remote clients to cause arbitrary code execution and exfiltrate files/system information. Using pickle over an untrusted network and invoking methods by client-supplied names are severe supply-chain/backdoor risks. Do not deploy or reuse this code in production; it should be treated as a backdoor/untrusted remote-execution component unless wrapped with strong authentication, authorization, sandboxing, and safe serialization.

mtmai

0.5.17

Live on pypi

Blocked by Socket

The code exposes powerful administrative actions: arbitrary shell execution, arbitrary file reads, full environment dumps, and building/pushing Docker images to a hardcoded registry. These are not obfuscated but are high-risk capabilities that can be abused for data exfiltration, remote code execution, and supply-chain leakage if the superuser authentication is compromised or misconfigured. The presence of a hardcoded remote image name for docker push is suspicious for unintended outbound artifact exfiltration. Recommendation: avoid including these endpoints in public packages or ensure strict, auditable authentication and input validation; remove hardcoded push targets and avoid returning full environment variables or arbitrary file contents.

mtmai

0.3.1365

Live on pypi

Blocked by Socket

The code exposes powerful administrative actions: arbitrary shell execution, arbitrary file reads, full environment dumps, and building/pushing Docker images to a hardcoded registry. These are not obfuscated but are high-risk capabilities that can be abused for data exfiltration, remote code execution, and supply-chain leakage if the superuser authentication is compromised or misconfigured. The presence of a hardcoded remote image name for docker push is suspicious for unintended outbound artifact exfiltration. Recommendation: avoid including these endpoints in public packages or ensure strict, auditable authentication and input validation; remove hardcoded push targets and avoid returning full environment variables or arbitrary file contents.

amaru-ledger

0.1.1

Live on cargo

Blocked by Socket

The fragment is highly suspicious: a large obfuscated/binary-looking payload with embedded domain references and potential command indicators. While not conclusive on its own, the combination suggests a potential hidden payload or backdoor vector that could be activated upon deobfuscation or decoding. Treat as a high-risk indicator and require sanitized, decodable samples or metadata before deeming it safe.

@joystick.js/cli-canary

0.0.0-canary.1705

by cheatcodetuts

Live on npm

Blocked by Socket

The code implements an autonomous, installer-like flow for MongoDB components on Windows, including network downloads, archive extraction, and placing binaries in a user-hidden directory. This behavior presents significant security and supply-chain risks due to lack of user consent, absence of integrity checks, and potential persistence. It should be reviewed for necessity, replaced with explicit user prompts and verifiable integrity checks (digests/signatures), and ideally moved to a clearly trusted installer process rather than a library-like module.

affinequant

99.6

Live on pypi

Blocked by Socket

The code collects sensitive system information and sends it to external URLs without user consent. The use of base64 encoding for URLs and MAC addresses suggests an attempt to obfuscate the code's intent. This behavior is consistent with data exfiltration, a common malicious activity, posing a significant security risk.

pyhtools

2.2.4

Live on pypi

Blocked by Socket

This code implements a straightforward HTTP backdoor/C2 client: it polls a remote URL for commands, executes them locally via the system shell, and posts outputs and exceptions back to the same endpoint. It provides unauthenticated remote code execution, directory control, and data exfiltration over cleartext HTTP. The component is malicious and should not be executed on production systems; any instance found should be treated as a compromise and investigated in a sandboxed environment.

swarm-safety

1.3.1

Live on pypi

Blocked by Socket

This module is explicitly adversarial and returns actionable suggestions that, if consumed and executed without strict validation and authorization, can lead to privilege escalation, unauthorized financial actions, or disruptive incident-response behavior. The file does not itself perform I/O or network activity, but it is a dangerous supply-chain component: treat it as malicious/instrumental in adversarial steering and do not allow automated execution of its outputs without strong governance (human review, authorization checks, parameter validation, and mapping of endpoints to a safe execution policy).

sandbox-checkout-package

0.1.99

by kohlbyrd

Live on npm

Blocked by Socket

This script is malicious: it is a targeted checkout-hijacking implant for Shopify-like stores. It harvests cart contents and discount codes by fetching /cart.js, exfiltrates them to hardcoded local endpoints, and forcibly redirects or prevents legitimate checkout flows. It globally overrides navigation and network APIs to make the interception robust. Remove the script, audit recent package updates and sources that injected it, and investigate any local services (127.0.0.1:3000/3001) or proxy agents that may have received the posted data.

@xunlie/vue-context-menu

1.0.3

by xunlie

Live on npm

Blocked by Socket

This script appears to be obfuscated, as it is using Base64 encoding to execute a command. The command is running a local script using the 'child_process' module. The contents of the script should be reviewed carefully to ensure that it is not malicious in nature.

meditek

1.0.1

by jodx00

Removed from npm

Blocked by Socket

The code collects and sends sensitive system information to a potentially malicious domain, which is a significant privacy and security concern. The behavior aligns with data exfiltration patterns, indicating a high risk of malicious intent.

Live on npm for 15 days, 10 hours and 4 minutes before removal. Socket users were protected even while the package was live.

licensehelper.core

1.0.11

by LicenseHelper.Core

Live on nuget

Blocked by Socket

The code is strongly obfuscated and exhibits multiple high-risk behaviors typical of loaders/packers and many malware families: embedded resource decryption, RSA signature verification, dynamic method emission that executes code from decrypted resources, hidden process creation, and registry writes to HKLM. There is no benign justification in a typical library for these combined behaviors. Treat this component as high-risk: if not from a verified protector vendor with documented behavior, do not include it in your supply chain. Perform full offline analysis and dynamic sandboxing of the embedded resources, and inspect any registry keys written. Consider blocking at build/CI until provenance and intent are validated.

io.github.reajason:generator

2.6.1

Live on maven

Blocked by Socket

The code implements a dynamic class loading payload mechanism triggered by specific HTTP headers and parameters, enabling remote execution of arbitrary code supplied by a client. This constitutes a backdoor-like behavior and a severe security risk if exposed. It is a high-confidence indicator of malicious behavior (remote code execution backdoor) and should be treated as extremely dangerous in any public or shipped package.

asifjamali

28.9.3

Removed from pypi

Blocked by Socket

The script poses a moderate security risk due to its ability to download and execute code from external sources, delete files, and manage proxy lists. The hardcoded IP address and file deletion functionality are concerning, but there is no explicit evidence of malicious intent.

Live on pypi for 4 minutes before removal. Socket users were protected even while the package was live.

plengauer/thoth

8d6ad1a6961085c99b929d4d4682ca4b43bd48a3

Live on actions

Blocked by Socket

The code unconditionally executes a packaged shell script on Linux at import time with inherited stdio and package-directory working directory. The JS itself doesn't contain explicit malicious payloads, but this pattern is a high supply-chain risk: it grants any contents of inject_and_init.sh the ability to execute arbitrary commands with the user's privileges, interact with the terminal, read environment variables, and access the filesystem and network. Treat the package as potentially dangerous unless you can audit or control the script contents and provenance. Recommend removing automatic execution, adding explicit opt-in APIs, verifying script integrity (signatures/hashes), avoiding inherited stdio, and performing existence and content checks before execution.

abstract-database

0.0.2.94

Live on pypi

Blocked by Socket

The code in the flagged file explicitly reads a local file from a fixed system path (/home/joben/Desktop/testsol/abstract_it.py) and transmits its contents via an HTTP request to a Discord webhook. The target URL is hardcoded as https://discordapp[.]com/api/webhooks/1278595755812327424/3xvzS30Bx8bOhooNJeY9gnYj2KjFb2-ZfV2rHpBdkS71tuibNeu56_mRFE38MrmQRa_j, with the embedded token included in the URL. This behavior is characteristic of malware designed for data exfiltration, as it automatically sends potentially sensitive file content to an external service without user consent.

serve-sim

0.0.5

by evanbacon

Live on npm

Blocked by Socket

This module is critically unsafe for any environment where untrusted parties can reach the server. It exposes an HTTP `POST ${basePath}/exec` endpoint that performs arbitrary host command execution using `child_process.exec` with client-supplied input. It also streams simulator logs/appstate via `xcrun` and serves a large embedded JS payload that likely drives automation. Additional impact includes host process termination and deletion of local state files based on parsed temp JSON. Overall, the design matches a high-risk backdoor/RCE-capable supply-chain component rather than a safe simulator preview tool.

taichi-nightly

0.2.0

Live on pypi

Blocked by Socket

This code contains clear backdoor-like behavior: plaintext hardcoded Gmail credentials and automatic registration of callbacks that send emails with hostname and task identifiers to an external recipient. That enables covert data exfiltration and remote notification without explicit user consent. The component should be considered malicious or at minimum unacceptable for inclusion in trusted dependencies until credentials are removed and opt-in controls and secure secret handling are implemented.

skiko-wasm-js

10.0.1

by cybershree3

Live on npm

Blocked by Socket

This install script collects environment and user information from the host and posts it to an external server during installation. That is direct data exfiltration / unauthorized telemetry and poses a high privacy and security risk. It may be used for fingerprinting or as a precursor to further malicious actions. Review and remove such behavior or block network access during install; inspect repository history and publisher trustworthiness.

analytika-analytika-utils

6.350.0

by hcarme

Removed from npm

Blocked by Socket

The code sends environment variables to a potentially suspicious domain, indicating data exfiltration. This is a clear sign of malicious behavior.

Live on npm for 2 hours and 52 minutes before removal. Socket users were protected even while the package was live.

github.com/milvus-io/milvus

v0.10.3-0.20211022124910-5c589244205b

Live on go

Blocked by Socket

This code implements an insecure, unauthenticated RPC mechanism that allows remote clients to cause arbitrary code execution and exfiltrate files/system information. Using pickle over an untrusted network and invoking methods by client-supplied names are severe supply-chain/backdoor risks. Do not deploy or reuse this code in production; it should be treated as a backdoor/untrusted remote-execution component unless wrapped with strong authentication, authorization, sandboxing, and safe serialization.

mtmai

0.5.17

Live on pypi

Blocked by Socket

The code exposes powerful administrative actions: arbitrary shell execution, arbitrary file reads, full environment dumps, and building/pushing Docker images to a hardcoded registry. These are not obfuscated but are high-risk capabilities that can be abused for data exfiltration, remote code execution, and supply-chain leakage if the superuser authentication is compromised or misconfigured. The presence of a hardcoded remote image name for docker push is suspicious for unintended outbound artifact exfiltration. Recommendation: avoid including these endpoints in public packages or ensure strict, auditable authentication and input validation; remove hardcoded push targets and avoid returning full environment variables or arbitrary file contents.

mtmai

0.3.1365

Live on pypi

Blocked by Socket

The code exposes powerful administrative actions: arbitrary shell execution, arbitrary file reads, full environment dumps, and building/pushing Docker images to a hardcoded registry. These are not obfuscated but are high-risk capabilities that can be abused for data exfiltration, remote code execution, and supply-chain leakage if the superuser authentication is compromised or misconfigured. The presence of a hardcoded remote image name for docker push is suspicious for unintended outbound artifact exfiltration. Recommendation: avoid including these endpoints in public packages or ensure strict, auditable authentication and input validation; remove hardcoded push targets and avoid returning full environment variables or arbitrary file contents.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Git dependency

GitHub dependency

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

Telemetry

Protestware or potentially unwanted behavior

Unstable ownership

55 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a Demo

Questions? Call us at (844) SOCKET-0

Read the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles