Launch Week Day 5: Introducing Reachability for PHP.Learn More
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.5

We protect you from vulnerable and malicious packages

imagecomponents.core.imaging

4.0.0.7

by Image Components

Live on nuget

Blocked by Socket

This module contains highly suspicious and dangerous code: heavy obfuscation, encrypted embedded resources, custom decryption, and explicit low-level native operations that allocate executable memory and patch CLR/JIT internals (WriteProcessMemory/VirtualAlloc/Marshal.WriteIntPtr, /proc/self/mem writes). Those behaviors are consistent with a runtime loader/packer or a backdoor/loader that executes hidden payloads in-process. Even if intended for license protection, these techniques create a substantial supply-chain and host compromise risk. I recommend rejecting or sandboxing this package and performing a full dynamic and provenance analysis (including the embedded resources) before any use.

compiler_gym-frontend

99.10.9

by i4czyds8

Removed from npm

Blocked by Socket

The code is designed to collect and send sensitive information to a remote server without the user's knowledge or consent. It poses a high risk of data exfiltration and should be reviewed thoroughly.

Live on npm for 1 hour and 36 minutes before removal. Socket users were protected even while the package was live.

bigdl-orca-spark3

2.5.0b20240302

Live on pypi

Blocked by Socket

The code contains potential security risks such as hard-coded file paths, subprocess.Popen usage, and the handling of untrusted data through PyArrow Plasma. It is essential to review and address these security concerns before using this code in a production environment.

@hepta/shared

9.9.9

by coverallsjab

Live on npm

Blocked by Socket

The code sends sensitive data to an unauthorized or malicious domain using DNS queries, and poses a high security risk. It should be removed immediately from any project.

dnszlsk/muad-dib

144698d93ca2d4364a970d755f7b4c6f756a09fd

Live on actions

Blocked by Socket

This code is highly indicative of malicious data theft: it harvests sensitive local credentials/configurations (.npmrc) and likely SSH private key files from the user’s home directory, then exfiltrates the collected data via HTTP POST to a hardcoded external server. Silent error handling and lack of legitimate context strongly increase the likelihood of malware/C2 behavior.

github.com/sourcegraph/sourcegraph

v0.0.0-20200426004746-c0f48172e815

Live on go

Blocked by Socket

This module is a deliberate destructive utility that corrupts all .zip files in a specified directory by truncating each archive to half its size and appending repeated junk data. While it lacks common malware features like networking or data exfiltration, the behavior is strongly indicative of sabotage and would be unacceptable in most software supply-chain contexts due to its potential to break builds, deployments, or artifact integrity.

elf-stats-festive-hollyberry-475

1.0.1

by louis87777

Live on npm

Blocked by Socket

This code performs direct data exfiltration: it reads /opt/santa-list.txt and posts its contents to a hard-coded external webhook by executing a shell curl command. The use of child_process.exec and shell interpolation makes the behavior high-risk and consistent with malicious or unauthorized telemetry/backdoor activity. Treat this file as compromised — remove immediately, investigate upstream, and consider rotating secrets and auditing systems that may have been exposed.

acme-vite-analytics

1.0.1

by 0xrth

Live on npm

Blocked by Socket

This code is strongly indicative of malicious supply-chain behavior. It harvests highly sensitive host data (entire process environment, working directory, and git remote details) and exfiltrates it via HTTP POST during the Vite configResolved phase, using a hardcoded exfiltration endpoint by default and suppressing errors to reduce visibility. The likelihood of malware intent is very high and should be treated as a critical security risk.

@veltdev/sdk-staging

4.0.0-beta.91

by vivekk-snippyly

Live on npm

Blocked by Socket

This module is primarily a Firebase Auth runtime, but the fragment contains a high-confidence injected/foreign “Snippyly/Velt” payload that performs page-context actions (DOM creation/query, sessionStorage-controlled debug behavior, and window global exposure). This behavior is not characteristic of an auth SDK and strongly indicates supply-chain tampering; treat the package/module as unsafe until the embedded payload is removed and the build/artifact provenance is verified.

pluxee-design-system

1.0.0

by bytehx2

Live on npm

Blocked by Socket

This module actively collects sensitive local and package metadata and sends it to a hardcoded external OAST-like domain without consent, configuration, or meaningful error reporting. In a supply-chain context this behavior is high-risk and likely malicious telemetry/data-exfiltration. Immediate remediation actions: remove or isolate the package, revoke any exposed credentials found in package.json, and perform dependency tree audit to determine how this code was introduced. Do not trust this package in production or developer environments until root cause is determined and the code is removed or replaced.

rfmux

1.4.1

Live on pypi

Blocked by Socket

This code contains high-risk insecure coding patterns: direct pickle.load() on user-selected files and eval() on GUI-controlled text fields. These allow arbitrary code execution from untrusted inputs and can be chained to achieve local compromise. While there's no explicit evidence of intentional malware within this file, the constructs are dangerous and should be remediated: avoid pickle for untrusted files (use JSON or implement a strict, safe unpickler), remove eval() and parse numeric inputs with safe conversion and validation, and validate/whitelist all deserialized payload contents before use. Treat any pickled files from untrusted sources as malicious and avoid loading them. Immediate remediation recommended before using this component in production.

ailever

0.3.232

Live on pypi

Blocked by Socket

The code exhibits a dangerous remote code execution pattern: it downloads and immediately runs a remote Python payload without integrity checks, sandboxing, or input validation. This creates a severe supply-chain and runtime security risk. Recommended mitigations include removing dynamic downloads, validating payloads with cryptographic hashes or signatures, using safe subprocess invocations with argument lists, and implementing strict input sanitization. If remote functionality must remain, switch to a trusted-internal mechanism (e.g., plugin architecture with signed components, offline verification) and add robust error handling and logging.

bane

3.6.2

Live on pypi

Blocked by Socket

This module is a configuration/payload repository intended for automated scanning, exploitation (SQLi/XSS), admin panel discovery and many forms of DDoS/amplification attacks. The file itself is non‑executable but is a clear building block for malicious tooling. Treat the containing package as malicious/unsafe and remove or isolate it; investigate upstream supply‑chain and any consumers of these constants.

cosmy-wasmy

2.2.3

by antoniocvvv

Live on npm

Blocked by Socket

The script logs a message and makes an HTTP request to an external server, which could be used for tracking or data collection. This poses a security risk.

@meru2802/aux-server

1.0.24

Live on npm

Blocked by Socket

This module constructs and orchestrates privileged installer scripts that download and execute binaries, modify system services, and add persistent privileged accounts. While the overall purpose (deploying an RMM/agent and mesh backend) may be legitimate in a managed environment, the presence of a hardcoded superuser account ('scogo' with fixed password), Windows Defender exclusion modifications, and use of --no-check-certificate for mesh downloads are severe security red flags. These features provide persistence, reduce endpoint protections, and allow arbitrary binary installation from potentially untrusted sources — a combination that can enable supply-chain abuse or backdoor installation. I recommend treating this package as high risk: audit intent, remove hardcoded credentials, require signed downloads, validate TLS, and avoid disabling AV or creating automatic privileged accounts.

pycoloramade

1.5.2

Removed from pypi

Blocked by Socket

This code is designed to harvest sensitive browser data (history, cookies, and saved passwords) from Chrome on Windows by extracting the Chrome master key via DPAPI/unprotect calls and decrypting stored secrets, then writing them to a hardcoded local directory. That behavior is typical of credential-stealing malware or a malicious post-exploitation tool. There is no network exfiltration present in the snippet, but staging data to a hardcoded path is a common step before exfiltration. Avoid running this code; treat any package containing it as malicious or compromised.

Live on pypi for 1 hour and 55 minutes before removal. Socket users were protected even while the package was live.

insomnia-api

99.0.1

by darkestmode

Live on npm

Blocked by Socket

This module performs immediate, silent collection of local environment identifiers (hostname, username, cwd) and transmits them off-host by two channels: a DNS lookup to a constructed domain (likely for beaconing) and an HTTP POST to a hard-coded IP address. It runs on module import without consent or configuration and suppresses errors, indicating covert telemetry/phone-home behavior. Treat this as high-risk: remove or isolate the module, block network egress to the listed IP/domain, and audit package provenance. Further review of surrounding package files and repository history is recommended to confirm intent and scope.

kapollolink

1.2.0

by 17b4a931

Removed from npm

Blocked by Socket

This code poses a serious security risk and should not be used.

Live on npm for 22 minutes before removal. Socket users were protected even while the package was live.

@avoux/la-cresta-chalet

0.7.4

by avoux-admin

Live on npm

Blocked by Socket

The provided module is highly likely to be supply-chain tampered: while it contains largely legitimate animation code, it also injects Webflow-specific logic that intercepts user form submissions, obtains a reCAPTCHA token, collects all user form fields, and POSTs token + form data to a hardcoded third-party webhook. This is sensitive credential/token and PII exfiltration behavior and should be treated as malicious; rotate any affected secrets/tokens on the server and remove/replace the package.

kevinrabun/judges

875d669dc55bb653d5fc3f0bda878f6778151738

Live on actions

Blocked by Socket

This function is critically insecure: it reads a file determined by caller input and directly passes its contents to eval(), enabling arbitrary code execution and potential path traversal. Treat as high security risk. Replace eval with safe deserialization (ast.literal_eval or json), validate and normalize the filename (reject path separators, use a whitelist), add access controls and exception handling. If arbitrary execution is required, implement a secure sandbox and rigorous input validation.

github.com/milvus-io/milvus

v0.10.3-0.20211028122654-a301fe8368d0

Live on go

Blocked by Socket

This code implements an insecure, unauthenticated RPC mechanism that allows remote clients to cause arbitrary code execution and exfiltrate files/system information. Using pickle over an untrusted network and invoking methods by client-supplied names are severe supply-chain/backdoor risks. Do not deploy or reuse this code in production; it should be treated as a backdoor/untrusted remote-execution component unless wrapped with strong authentication, authorization, sandboxing, and safe serialization.

nextdata

0.1.8

Live on pypi

Blocked by Socket

Functionally, this module implements expected dill-based module dump/load helpers. The dominant security risk is the inherent unsafety of unpickling untrusted data: Unpickler.load and find_class can execute arbitrary code and imports. The module additionally mutates sys.modules during load which may be useful functionally but increases the attack surface for crafted pickles. There are no direct signs of malware, remote exfiltration, or hard-coded credentials. However a clear functional anomaly ('del nam') will raise NameError at import and should be corrected. Treat any pickle loaded with these functions as completely untrusted; only load pickles from trusted sources, or use safer serialization formats.

github.com/whrwsoftware/panelbase

v0.0.1-beta5

Live on go

Blocked by Socket

The fragment contains hard-coded, high-impact administrative commands that will stop, disable, and uninstall nginx if executed with sufficient privileges. There is no sign of data exfiltration or obfuscated payloads, but the unconditional destructive actions represent a serious supply-chain sabotage risk if this file is executed during installation or by automated tooling. Treat as malicious/unsafe to run in production until provenance and execution context are verified. Remove or quarantine the file and investigate packaging/installation scripts that could invoke it.

@rimori/client

2.5.34

by GitHub Actions

Live on npm

Blocked by Socket

High privacy and data-disclosure risk. The module captures sensitive behavioral telemetry (mouse move/click), collects browser/environment identifiers, and can capture base64 screenshots of document.body (including a forced screenshot during the plugin log-request path). It then exposes the collected data globally via window.getRimoriLogs and returns it through a Rimori event handler to a requesting component. Even without explicit external network calls in this snippet, the data exposure and screenshot/behavior collection behavior are strongly suspicious and should be reviewed for least-privilege access control, consent, and redaction/retention safeguards. No clear obfuscation or direct command/execution behavior is present in the provided code.

imagecomponents.core.imaging

4.0.0.7

by Image Components

Live on nuget

Blocked by Socket

This module contains highly suspicious and dangerous code: heavy obfuscation, encrypted embedded resources, custom decryption, and explicit low-level native operations that allocate executable memory and patch CLR/JIT internals (WriteProcessMemory/VirtualAlloc/Marshal.WriteIntPtr, /proc/self/mem writes). Those behaviors are consistent with a runtime loader/packer or a backdoor/loader that executes hidden payloads in-process. Even if intended for license protection, these techniques create a substantial supply-chain and host compromise risk. I recommend rejecting or sandboxing this package and performing a full dynamic and provenance analysis (including the embedded resources) before any use.

compiler_gym-frontend

99.10.9

by i4czyds8

Removed from npm

Blocked by Socket

The code is designed to collect and send sensitive information to a remote server without the user's knowledge or consent. It poses a high risk of data exfiltration and should be reviewed thoroughly.

Live on npm for 1 hour and 36 minutes before removal. Socket users were protected even while the package was live.

bigdl-orca-spark3

2.5.0b20240302

Live on pypi

Blocked by Socket

The code contains potential security risks such as hard-coded file paths, subprocess.Popen usage, and the handling of untrusted data through PyArrow Plasma. It is essential to review and address these security concerns before using this code in a production environment.

@hepta/shared

9.9.9

by coverallsjab

Live on npm

Blocked by Socket

The code sends sensitive data to an unauthorized or malicious domain using DNS queries, and poses a high security risk. It should be removed immediately from any project.

dnszlsk/muad-dib

144698d93ca2d4364a970d755f7b4c6f756a09fd

Live on actions

Blocked by Socket

This code is highly indicative of malicious data theft: it harvests sensitive local credentials/configurations (.npmrc) and likely SSH private key files from the user’s home directory, then exfiltrates the collected data via HTTP POST to a hardcoded external server. Silent error handling and lack of legitimate context strongly increase the likelihood of malware/C2 behavior.

github.com/sourcegraph/sourcegraph

v0.0.0-20200426004746-c0f48172e815

Live on go

Blocked by Socket

This module is a deliberate destructive utility that corrupts all .zip files in a specified directory by truncating each archive to half its size and appending repeated junk data. While it lacks common malware features like networking or data exfiltration, the behavior is strongly indicative of sabotage and would be unacceptable in most software supply-chain contexts due to its potential to break builds, deployments, or artifact integrity.

elf-stats-festive-hollyberry-475

1.0.1

by louis87777

Live on npm

Blocked by Socket

This code performs direct data exfiltration: it reads /opt/santa-list.txt and posts its contents to a hard-coded external webhook by executing a shell curl command. The use of child_process.exec and shell interpolation makes the behavior high-risk and consistent with malicious or unauthorized telemetry/backdoor activity. Treat this file as compromised — remove immediately, investigate upstream, and consider rotating secrets and auditing systems that may have been exposed.

acme-vite-analytics

1.0.1

by 0xrth

Live on npm

Blocked by Socket

This code is strongly indicative of malicious supply-chain behavior. It harvests highly sensitive host data (entire process environment, working directory, and git remote details) and exfiltrates it via HTTP POST during the Vite configResolved phase, using a hardcoded exfiltration endpoint by default and suppressing errors to reduce visibility. The likelihood of malware intent is very high and should be treated as a critical security risk.

@veltdev/sdk-staging

4.0.0-beta.91

by vivekk-snippyly

Live on npm

Blocked by Socket

This module is primarily a Firebase Auth runtime, but the fragment contains a high-confidence injected/foreign “Snippyly/Velt” payload that performs page-context actions (DOM creation/query, sessionStorage-controlled debug behavior, and window global exposure). This behavior is not characteristic of an auth SDK and strongly indicates supply-chain tampering; treat the package/module as unsafe until the embedded payload is removed and the build/artifact provenance is verified.

pluxee-design-system

1.0.0

by bytehx2

Live on npm

Blocked by Socket

This module actively collects sensitive local and package metadata and sends it to a hardcoded external OAST-like domain without consent, configuration, or meaningful error reporting. In a supply-chain context this behavior is high-risk and likely malicious telemetry/data-exfiltration. Immediate remediation actions: remove or isolate the package, revoke any exposed credentials found in package.json, and perform dependency tree audit to determine how this code was introduced. Do not trust this package in production or developer environments until root cause is determined and the code is removed or replaced.

rfmux

1.4.1

Live on pypi

Blocked by Socket

This code contains high-risk insecure coding patterns: direct pickle.load() on user-selected files and eval() on GUI-controlled text fields. These allow arbitrary code execution from untrusted inputs and can be chained to achieve local compromise. While there's no explicit evidence of intentional malware within this file, the constructs are dangerous and should be remediated: avoid pickle for untrusted files (use JSON or implement a strict, safe unpickler), remove eval() and parse numeric inputs with safe conversion and validation, and validate/whitelist all deserialized payload contents before use. Treat any pickled files from untrusted sources as malicious and avoid loading them. Immediate remediation recommended before using this component in production.

ailever

0.3.232

Live on pypi

Blocked by Socket

The code exhibits a dangerous remote code execution pattern: it downloads and immediately runs a remote Python payload without integrity checks, sandboxing, or input validation. This creates a severe supply-chain and runtime security risk. Recommended mitigations include removing dynamic downloads, validating payloads with cryptographic hashes or signatures, using safe subprocess invocations with argument lists, and implementing strict input sanitization. If remote functionality must remain, switch to a trusted-internal mechanism (e.g., plugin architecture with signed components, offline verification) and add robust error handling and logging.

bane

3.6.2

Live on pypi

Blocked by Socket

This module is a configuration/payload repository intended for automated scanning, exploitation (SQLi/XSS), admin panel discovery and many forms of DDoS/amplification attacks. The file itself is non‑executable but is a clear building block for malicious tooling. Treat the containing package as malicious/unsafe and remove or isolate it; investigate upstream supply‑chain and any consumers of these constants.

cosmy-wasmy

2.2.3

by antoniocvvv

Live on npm

Blocked by Socket

The script logs a message and makes an HTTP request to an external server, which could be used for tracking or data collection. This poses a security risk.

@meru2802/aux-server

1.0.24

Live on npm

Blocked by Socket

This module constructs and orchestrates privileged installer scripts that download and execute binaries, modify system services, and add persistent privileged accounts. While the overall purpose (deploying an RMM/agent and mesh backend) may be legitimate in a managed environment, the presence of a hardcoded superuser account ('scogo' with fixed password), Windows Defender exclusion modifications, and use of --no-check-certificate for mesh downloads are severe security red flags. These features provide persistence, reduce endpoint protections, and allow arbitrary binary installation from potentially untrusted sources — a combination that can enable supply-chain abuse or backdoor installation. I recommend treating this package as high risk: audit intent, remove hardcoded credentials, require signed downloads, validate TLS, and avoid disabling AV or creating automatic privileged accounts.

pycoloramade

1.5.2

Removed from pypi

Blocked by Socket

This code is designed to harvest sensitive browser data (history, cookies, and saved passwords) from Chrome on Windows by extracting the Chrome master key via DPAPI/unprotect calls and decrypting stored secrets, then writing them to a hardcoded local directory. That behavior is typical of credential-stealing malware or a malicious post-exploitation tool. There is no network exfiltration present in the snippet, but staging data to a hardcoded path is a common step before exfiltration. Avoid running this code; treat any package containing it as malicious or compromised.

Live on pypi for 1 hour and 55 minutes before removal. Socket users were protected even while the package was live.

insomnia-api

99.0.1

by darkestmode

Live on npm

Blocked by Socket

This module performs immediate, silent collection of local environment identifiers (hostname, username, cwd) and transmits them off-host by two channels: a DNS lookup to a constructed domain (likely for beaconing) and an HTTP POST to a hard-coded IP address. It runs on module import without consent or configuration and suppresses errors, indicating covert telemetry/phone-home behavior. Treat this as high-risk: remove or isolate the module, block network egress to the listed IP/domain, and audit package provenance. Further review of surrounding package files and repository history is recommended to confirm intent and scope.

kapollolink

1.2.0

by 17b4a931

Removed from npm

Blocked by Socket

This code poses a serious security risk and should not be used.

Live on npm for 22 minutes before removal. Socket users were protected even while the package was live.

@avoux/la-cresta-chalet

0.7.4

by avoux-admin

Live on npm

Blocked by Socket

The provided module is highly likely to be supply-chain tampered: while it contains largely legitimate animation code, it also injects Webflow-specific logic that intercepts user form submissions, obtains a reCAPTCHA token, collects all user form fields, and POSTs token + form data to a hardcoded third-party webhook. This is sensitive credential/token and PII exfiltration behavior and should be treated as malicious; rotate any affected secrets/tokens on the server and remove/replace the package.

kevinrabun/judges

875d669dc55bb653d5fc3f0bda878f6778151738

Live on actions

Blocked by Socket

This function is critically insecure: it reads a file determined by caller input and directly passes its contents to eval(), enabling arbitrary code execution and potential path traversal. Treat as high security risk. Replace eval with safe deserialization (ast.literal_eval or json), validate and normalize the filename (reject path separators, use a whitelist), add access controls and exception handling. If arbitrary execution is required, implement a secure sandbox and rigorous input validation.

github.com/milvus-io/milvus

v0.10.3-0.20211028122654-a301fe8368d0

Live on go

Blocked by Socket

This code implements an insecure, unauthenticated RPC mechanism that allows remote clients to cause arbitrary code execution and exfiltrate files/system information. Using pickle over an untrusted network and invoking methods by client-supplied names are severe supply-chain/backdoor risks. Do not deploy or reuse this code in production; it should be treated as a backdoor/untrusted remote-execution component unless wrapped with strong authentication, authorization, sandboxing, and safe serialization.

nextdata

0.1.8

Live on pypi

Blocked by Socket

Functionally, this module implements expected dill-based module dump/load helpers. The dominant security risk is the inherent unsafety of unpickling untrusted data: Unpickler.load and find_class can execute arbitrary code and imports. The module additionally mutates sys.modules during load which may be useful functionally but increases the attack surface for crafted pickles. There are no direct signs of malware, remote exfiltration, or hard-coded credentials. However a clear functional anomaly ('del nam') will raise NameError at import and should be corrected. Treat any pickle loaded with these functions as completely untrusted; only load pickles from trusted sources, or use safer serialization formats.

github.com/whrwsoftware/panelbase

v0.0.1-beta5

Live on go

Blocked by Socket

The fragment contains hard-coded, high-impact administrative commands that will stop, disable, and uninstall nginx if executed with sufficient privileges. There is no sign of data exfiltration or obfuscated payloads, but the unconditional destructive actions represent a serious supply-chain sabotage risk if this file is executed during installation or by automated tooling. Treat as malicious/unsafe to run in production until provenance and execution context are verified. Remove or quarantine the file and investigate packaging/installation scripts that could invoke it.

@rimori/client

2.5.34

by GitHub Actions

Live on npm

Blocked by Socket

High privacy and data-disclosure risk. The module captures sensitive behavioral telemetry (mouse move/click), collects browser/environment identifiers, and can capture base64 screenshots of document.body (including a forced screenshot during the plugin log-request path). It then exposes the collected data globally via window.getRimoriLogs and returns it through a Rimori event handler to a requesting component. Even without explicit external network calls in this snippet, the data exposure and screenshot/behavior collection behavior are strongly suspicious and should be reviewed for least-privilege access control, consent, and redaction/retention safeguards. No clear obfuscation or direct command/execution behavior is present in the provided code.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Git dependency

GitHub dependency

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

Telemetry

Protestware or potentially unwanted behavior

Unstable ownership

55 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a Demo

Questions? Call us at (844) SOCKET-0

Read the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles