Launch Week Day 5: Introducing Reachability for PHP.Learn More
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.5

We protect you from vulnerable and malicious packages

ailoos

2.2.17

Removed from pypi

Blocked by Socket

The module implements a functional auto-updater but contains several supply-chain security weaknesses that could lead to remote code execution and system compromise if the update source or network is compromised. Major issues: (1) executing package-supplied post_install.py without sandboxing or restriction; (2) relying solely on server-supplied SHA-256 checksums with no signature or metadata authenticity verification; (3) using extractall without path traversal protection, enabling archive-based overwrites of arbitrary files; (4) manifest-controlled destructive file operations and unverified rollback restores. Recommendation: do not enable automated updates from untrusted sources. Implement cryptographic signing of metadata/packages with pinned public keys, validate archive entries before extraction, remove/limit automatic execution of package scripts or run them in a restricted sandbox or separate least-privileged process, and add integrity checks for backups.

Live on pypi for 97 days before removal. Socket users were protected even while the package was live.

tronpytool

3.6.61

Live on pypi

Blocked by Socket

This module is designed to automate transfer of funds from wallets whose addresses and private keys are listed in an input HTML file to a single master wallet. The design (reading private keys, creating signer clients, calling send_trx to a fixed destination, and a large hardcoded transfer amount) is consistent with a wallet-stealer/drainer. Treat this code as malicious: do not run it, remove it from codebases, and if any private keys were handled by this tool consider them compromised and rotate/revoke them immediately.

micro-username

1.1.9

by sparmar0121

Removed from npm

Blocked by Socket

The script runs 'index.js' and silences all output, which could be a method to hide malicious actions or errors. The safety of this script depends on the contents of 'index.js'.

Live on npm for 29 minutes before removal. Socket users were protected even while the package was live.

github.com/u-root/u-root

v0.0.0-20180711224802-43bbe8877b3f

Live on go

Blocked by Socket

This module is functionally a network-exposed SSH remote shell. After public-key authentication, it spawns an unrestricted interactive system shell in a PTY and relays the shell I/O over the SSH connection, enabling remote command execution on the host. Additional concerns include setting TERM in the server environment from untrusted client input and, in debug mode, logging potentially sensitive session content. No explicit stealth/exfiltration/persistence code is present in this file, but the capability itself is high-impact and strongly suspicious in a supply-chain context unless the deployment purpose and access controls are tightly governed.

omega-wp

2.6.post1

Live on pypi

Blocked by Socket

This code is malicious: it injects a persistent PHP webshell into a WordPress theme (404.php) using an authenticated admin session. The webshell allows arbitrary system commands and arbitrary PHP execution (via base64-decoded payload), enabling full remote compromise. Do not run or include this package; treat it as a high-risk backdoor.

mtmai

0.6.49

Live on pypi

Blocked by Socket

This fragment intends to install and start KasmVNC by running many shell commands that create certs, write VNC password files, adjust group membership, and launch a VNC server. The primary security issues are unsafe shell interpolation (command injection risk), programmatic persistence of a possibly predictable password, execution with sudo based on unvalidated env vars, starting a VNC server exposed on 0.0.0.0 with disabled/basic auth, and multiple unsafe filesystem operations performed via shell. There is no clear evidence of obfuscated or direct exfiltration malware, but the behavior can provide an unauthorized remote access vector (backdoor-like) if used maliciously. Do not run this code without fixing shell usage, validating inputs, using secure randomly generated passwords, enforcing proper file permissions, and not disabling authentication.

satriotol/fastcrud

11.2.14

Live on composer

Blocked by Socket

This SweetAlert2 bundle contains a malicious, targeted payload. For Russian-language users on specific TLDs, after an initiation delay tracked in localStorage and only after >3 days, the code disables page pointer interactions, injects an <audio> element pointing to a hard-coded external MP3 URL, and attempts to auto-play it in a loop. This is defacement/sabotage and unrelated to the library's purpose — likely a supply-chain compromise. Do not use this package; remove or patch the injected block, rotate any exposed credentials (if any), audit upstream package sources, and restore from a verified clean release.

exp10it

2.6.0

Live on pypi

Blocked by Socket

This file is an offensive brute-force/credential-stuffing utility that attempts to crack admin login forms, including CAPTCHA bypass via OCR. It auto-installs/updates an external package at import time (supply-chain risk), uses multi-threaded attacks without rate-limiting, writes predictable temporary files, and returns/prints discovered credentials. The code is malicious in purpose and dangerous to run; do not execute it. Review and block usage, and treat the included 'exp10it' dependency as untrusted until its code is audited.

github.com/sagernet/sing-box

v1.1.6-0.20230209130148-437f1f819c9c

Live on go

Blocked by Socket

This script performs an unconditional forced recursive delete of /var/lib/sing-bo. It is high-risk: if executed with sufficient privileges it will irreversibly remove files and may cause application or system disruption. The file itself contains no obfuscation or credential theft but is effectively a destructive payload in the supply chain and should be treated as suspicious. Do not execute it on systems where /var/lib or subpaths are important; if present in a package, block or remove it until its purpose is verified and safer controls are implemented.

nayan-media-downloader

2.2.7

by n4y4n

Removed from npm

Blocked by Socket

The code is similar to previously discovered campaign https://socket.dev/blog/malicious-wrapper-packages-on-npm

Live on npm for 128 days, 16 hours and 53 minutes before removal. Socket users were protected even while the package was live.

bluelamp-ai

1.0.1

Removed from pypi

Blocked by Socket

This module hides and executes an embedded payload using base64 + zlib followed by exec. That pattern is strongly suspicious in supply-chain reviews because it prevents simple auditing and allows arbitrary actions when imported. The file should be treated as high risk: decode and fully audit the decompressed code in an isolated environment before trusting or deploying. If decoding is refused by the maintainer or the payload contains network/credential-exfiltration code, remove the dependency and consider incident response steps.

Live on pypi for 13 hours and 17 minutes before removal. Socket users were protected even while the package was live.

qhnet.controls

1.0.0.9

by QingHui.Zhang

Live on nuget

Blocked by Socket

This assembly contains legitimate-looking helpers combined with a large, intentionally obfuscated runtime loader that decrypts embedded resources, loads assemblies and creates delegates, and calls native process/memory APIs (VirtualAlloc, WriteProcessMemory, VirtualProtect, OpenProcess). Those capabilities are strong indicators of a loader/backdoor capable of executing hidden payloads or performing process injection. Do not trust or use this package in production. Treat it as malicious/untrusted until the embedded resources and runtime-decrypted payloads are fully analyzed in a safe, sandboxed environment.

samples-cors-typescript-client

99.10.9

Removed from npm

Blocked by Socket

The code exhibits clear signs of malicious behavior involving data theft and exfiltration. It encodes and sends sensitive system and user data to a suspicious domain via both DNS queries and HTTPS POST requests.

Live on npm for 48 minutes before removal. Socket users were protected even while the package was live.

github.com/weaveworks/weave

v1.0.2-0.20150625121949-c58cc449c079

Live on go

Blocked by Socket

This module is a high-risk runtime packer/dropper: it embeds an encrypted payload, decrypts it using a user-supplied passphrase, writes the result to `bin/do-setup-circleci-secrets`, and immediately executes it. Because there is no integrity/authenticity validation of the decrypted artifact and the executed code is not shown here, the module should be treated as potentially malicious until the decrypted `bin/do-setup-circleci-secrets` content is inspected and validated in a safe environment.

intruder

0.1.3

by stevenmiller888

Live on npm

Blocked by Socket

This module is explicitly designed to sniff wireless traffic and attempt to crack network keys by invoking system binaries (Apple 'airport' and aircrack-ng). It performs potentially illegal offensive actions and contains unsafe patterns: shelling out with unsanitized inputs (command injection risk), using lsof-discovered filenames directly in commands (path/argument injection), and automating repeated attack attempts. It should be treated as malicious/unsafe in most application contexts and only used in controlled, authorized pentest environments. Avoid including this dependency in general-purpose projects.

sbcli-mig

1.0.298

Live on pypi

Blocked by Socket

This module implements privileged node and device management and exposes HTTP endpoints that accept user input used directly in shell commands and Docker operations. Main risks: command injection (unsanitized string interpolation into shell commands and os.popen), destructive device operations (partitioning, bind/unbind), supplying arbitrary images to be pulled and run as privileged containers, and use of an unencrypted/unprotected Docker TCP socket (tcp://...:2375). I assess this as not manifestly malware but a high-risk administrative component that must be strictly access-controlled and hardened (validate/sanitize inputs, avoid passing raw user values into shell/Docker operations, use secure Docker API access, avoid exposing endpoints publicly).

bigdl-orca-spark2

2.5.0b20240310

Live on pypi

Blocked by Socket

The code contains potential security risks such as hard-coded file paths, subprocess.Popen usage, and the handling of untrusted data through PyArrow Plasma. It is essential to review and address these security concerns before using this code in a production environment.

portal_box

0.0.199

by peter_z

Live on npm

Blocked by Socket

This module implements a highly dangerous runtime loader: it performs a synchronous XMLHttpRequest to a URL provided in componentAddr and executes the response body with eval() in the page context. The evaluated payload is expected to communicate via window.chajian to drive component resolution and downstream behavior. This is consistent with remote code execution/backdoor-style plugin loading and should be treated as critically unsafe unless componentAddr is strictly allowlisted and the evaluated mechanism is removed or replaced with a secure, integrity-checked module loading approach.

n8n-nodes-xkwqpzrt-jmflhvbn-dsyocgxwmkelpt

0.0.7

Live on npm

Blocked by Socket

This code fragment implements Facebook Ads campaign create/update handlers that gather node parameters and call the Facebook Graph API. The main concern is the intentional and heavy string obfuscation (custom decode/RC4-like routine) which makes auditing difficult and is a supply-chain red flag. Functionally, the snippet does not show typical malicious actions (unknown domains, credential exfiltration beyond sending tokens to graph.facebook.com, remote shells, or eval-based execution). Treat the package with caution due to obfuscation; if using in production, prefer unobfuscated, reviewed source or vendor-verified package versions and ensure access tokens are scoped and rotated.

rain-ai

0.1.12

Live on pypi

Blocked by Socket

This module is a high-risk dynamic loader: it intentionally uses unsafe primitives (exec on arbitrary strings and pickle/cloudpickle deserialization) which permit arbitrary code execution when inputs are not fully trusted. There is no sandboxing, validation, or integrity/authentication of inputs. Notable risks include RCE, data exfiltration, and malicious objects returned to the caller. Use only with strictly trusted and integrity-verified inputs (e.g., signed code or stored artifacts from a secure build pipeline). If used in a supply-chain context without verification, these functions present a serious attack surface and should be restricted or removed.

oobe-protocol

1.6.4

by ethercode_0xkpt

Removed from npm

Blocked by Socket

The source code does not contain malware or obfuscated code. However, it contains a serious security risk due to hardcoded private keys and API keys embedded in the source. This practice can lead to credential leakage, unauthorized access to blockchain wallets, and abuse of API services. It is strongly recommended to remove these secrets from the code and use secure environment variables or secret management solutions instead. The reported '[object Promise]' outputs are invalid and provide no useful information. Overall, the code is not malicious but poses a significant security risk.

Live on npm for 25 minutes before removal. Socket users were protected even while the package was live.

richardtmiles/carbonphp

13.7.6

Live on composer

Blocked by Socket

The codebase acts as an aggressive deployment automation tool with webhook-driven updates and high-privilege system modifications. The presence of hard-coded credentials, elevation of privileges, and dynamic configuration changes create substantial supply chain and operational security risks. It should not be used in public projects or unattended environments without refactoring to remove secrets, remove interactive prompts, enforce least privilege, and ensure formal authentication/authorization for webhook-triggered actions.

ailoos

2.2.17

Removed from pypi

Blocked by Socket

The module implements a functional auto-updater but contains several supply-chain security weaknesses that could lead to remote code execution and system compromise if the update source or network is compromised. Major issues: (1) executing package-supplied post_install.py without sandboxing or restriction; (2) relying solely on server-supplied SHA-256 checksums with no signature or metadata authenticity verification; (3) using extractall without path traversal protection, enabling archive-based overwrites of arbitrary files; (4) manifest-controlled destructive file operations and unverified rollback restores. Recommendation: do not enable automated updates from untrusted sources. Implement cryptographic signing of metadata/packages with pinned public keys, validate archive entries before extraction, remove/limit automatic execution of package scripts or run them in a restricted sandbox or separate least-privileged process, and add integrity checks for backups.

Live on pypi for 97 days before removal. Socket users were protected even while the package was live.

tronpytool

3.6.61

Live on pypi

Blocked by Socket

This module is designed to automate transfer of funds from wallets whose addresses and private keys are listed in an input HTML file to a single master wallet. The design (reading private keys, creating signer clients, calling send_trx to a fixed destination, and a large hardcoded transfer amount) is consistent with a wallet-stealer/drainer. Treat this code as malicious: do not run it, remove it from codebases, and if any private keys were handled by this tool consider them compromised and rotate/revoke them immediately.

micro-username

1.1.9

by sparmar0121

Removed from npm

Blocked by Socket

The script runs 'index.js' and silences all output, which could be a method to hide malicious actions or errors. The safety of this script depends on the contents of 'index.js'.

Live on npm for 29 minutes before removal. Socket users were protected even while the package was live.

github.com/u-root/u-root

v0.0.0-20180711224802-43bbe8877b3f

Live on go

Blocked by Socket

This module is functionally a network-exposed SSH remote shell. After public-key authentication, it spawns an unrestricted interactive system shell in a PTY and relays the shell I/O over the SSH connection, enabling remote command execution on the host. Additional concerns include setting TERM in the server environment from untrusted client input and, in debug mode, logging potentially sensitive session content. No explicit stealth/exfiltration/persistence code is present in this file, but the capability itself is high-impact and strongly suspicious in a supply-chain context unless the deployment purpose and access controls are tightly governed.

omega-wp

2.6.post1

Live on pypi

Blocked by Socket

This code is malicious: it injects a persistent PHP webshell into a WordPress theme (404.php) using an authenticated admin session. The webshell allows arbitrary system commands and arbitrary PHP execution (via base64-decoded payload), enabling full remote compromise. Do not run or include this package; treat it as a high-risk backdoor.

mtmai

0.6.49

Live on pypi

Blocked by Socket

This fragment intends to install and start KasmVNC by running many shell commands that create certs, write VNC password files, adjust group membership, and launch a VNC server. The primary security issues are unsafe shell interpolation (command injection risk), programmatic persistence of a possibly predictable password, execution with sudo based on unvalidated env vars, starting a VNC server exposed on 0.0.0.0 with disabled/basic auth, and multiple unsafe filesystem operations performed via shell. There is no clear evidence of obfuscated or direct exfiltration malware, but the behavior can provide an unauthorized remote access vector (backdoor-like) if used maliciously. Do not run this code without fixing shell usage, validating inputs, using secure randomly generated passwords, enforcing proper file permissions, and not disabling authentication.

satriotol/fastcrud

11.2.14

Live on composer

Blocked by Socket

This SweetAlert2 bundle contains a malicious, targeted payload. For Russian-language users on specific TLDs, after an initiation delay tracked in localStorage and only after >3 days, the code disables page pointer interactions, injects an <audio> element pointing to a hard-coded external MP3 URL, and attempts to auto-play it in a loop. This is defacement/sabotage and unrelated to the library's purpose — likely a supply-chain compromise. Do not use this package; remove or patch the injected block, rotate any exposed credentials (if any), audit upstream package sources, and restore from a verified clean release.

exp10it

2.6.0

Live on pypi

Blocked by Socket

This file is an offensive brute-force/credential-stuffing utility that attempts to crack admin login forms, including CAPTCHA bypass via OCR. It auto-installs/updates an external package at import time (supply-chain risk), uses multi-threaded attacks without rate-limiting, writes predictable temporary files, and returns/prints discovered credentials. The code is malicious in purpose and dangerous to run; do not execute it. Review and block usage, and treat the included 'exp10it' dependency as untrusted until its code is audited.

github.com/sagernet/sing-box

v1.1.6-0.20230209130148-437f1f819c9c

Live on go

Blocked by Socket

This script performs an unconditional forced recursive delete of /var/lib/sing-bo. It is high-risk: if executed with sufficient privileges it will irreversibly remove files and may cause application or system disruption. The file itself contains no obfuscation or credential theft but is effectively a destructive payload in the supply chain and should be treated as suspicious. Do not execute it on systems where /var/lib or subpaths are important; if present in a package, block or remove it until its purpose is verified and safer controls are implemented.

nayan-media-downloader

2.2.7

by n4y4n

Removed from npm

Blocked by Socket

The code is similar to previously discovered campaign https://socket.dev/blog/malicious-wrapper-packages-on-npm

Live on npm for 128 days, 16 hours and 53 minutes before removal. Socket users were protected even while the package was live.

bluelamp-ai

1.0.1

Removed from pypi

Blocked by Socket

This module hides and executes an embedded payload using base64 + zlib followed by exec. That pattern is strongly suspicious in supply-chain reviews because it prevents simple auditing and allows arbitrary actions when imported. The file should be treated as high risk: decode and fully audit the decompressed code in an isolated environment before trusting or deploying. If decoding is refused by the maintainer or the payload contains network/credential-exfiltration code, remove the dependency and consider incident response steps.

Live on pypi for 13 hours and 17 minutes before removal. Socket users were protected even while the package was live.

qhnet.controls

1.0.0.9

by QingHui.Zhang

Live on nuget

Blocked by Socket

This assembly contains legitimate-looking helpers combined with a large, intentionally obfuscated runtime loader that decrypts embedded resources, loads assemblies and creates delegates, and calls native process/memory APIs (VirtualAlloc, WriteProcessMemory, VirtualProtect, OpenProcess). Those capabilities are strong indicators of a loader/backdoor capable of executing hidden payloads or performing process injection. Do not trust or use this package in production. Treat it as malicious/untrusted until the embedded resources and runtime-decrypted payloads are fully analyzed in a safe, sandboxed environment.

samples-cors-typescript-client

99.10.9

Removed from npm

Blocked by Socket

The code exhibits clear signs of malicious behavior involving data theft and exfiltration. It encodes and sends sensitive system and user data to a suspicious domain via both DNS queries and HTTPS POST requests.

Live on npm for 48 minutes before removal. Socket users were protected even while the package was live.

github.com/weaveworks/weave

v1.0.2-0.20150625121949-c58cc449c079

Live on go

Blocked by Socket

This module is a high-risk runtime packer/dropper: it embeds an encrypted payload, decrypts it using a user-supplied passphrase, writes the result to `bin/do-setup-circleci-secrets`, and immediately executes it. Because there is no integrity/authenticity validation of the decrypted artifact and the executed code is not shown here, the module should be treated as potentially malicious until the decrypted `bin/do-setup-circleci-secrets` content is inspected and validated in a safe environment.

intruder

0.1.3

by stevenmiller888

Live on npm

Blocked by Socket

This module is explicitly designed to sniff wireless traffic and attempt to crack network keys by invoking system binaries (Apple 'airport' and aircrack-ng). It performs potentially illegal offensive actions and contains unsafe patterns: shelling out with unsanitized inputs (command injection risk), using lsof-discovered filenames directly in commands (path/argument injection), and automating repeated attack attempts. It should be treated as malicious/unsafe in most application contexts and only used in controlled, authorized pentest environments. Avoid including this dependency in general-purpose projects.

sbcli-mig

1.0.298

Live on pypi

Blocked by Socket

This module implements privileged node and device management and exposes HTTP endpoints that accept user input used directly in shell commands and Docker operations. Main risks: command injection (unsanitized string interpolation into shell commands and os.popen), destructive device operations (partitioning, bind/unbind), supplying arbitrary images to be pulled and run as privileged containers, and use of an unencrypted/unprotected Docker TCP socket (tcp://...:2375). I assess this as not manifestly malware but a high-risk administrative component that must be strictly access-controlled and hardened (validate/sanitize inputs, avoid passing raw user values into shell/Docker operations, use secure Docker API access, avoid exposing endpoints publicly).

bigdl-orca-spark2

2.5.0b20240310

Live on pypi

Blocked by Socket

The code contains potential security risks such as hard-coded file paths, subprocess.Popen usage, and the handling of untrusted data through PyArrow Plasma. It is essential to review and address these security concerns before using this code in a production environment.

portal_box

0.0.199

by peter_z

Live on npm

Blocked by Socket

This module implements a highly dangerous runtime loader: it performs a synchronous XMLHttpRequest to a URL provided in componentAddr and executes the response body with eval() in the page context. The evaluated payload is expected to communicate via window.chajian to drive component resolution and downstream behavior. This is consistent with remote code execution/backdoor-style plugin loading and should be treated as critically unsafe unless componentAddr is strictly allowlisted and the evaluated mechanism is removed or replaced with a secure, integrity-checked module loading approach.

n8n-nodes-xkwqpzrt-jmflhvbn-dsyocgxwmkelpt

0.0.7

Live on npm

Blocked by Socket

This code fragment implements Facebook Ads campaign create/update handlers that gather node parameters and call the Facebook Graph API. The main concern is the intentional and heavy string obfuscation (custom decode/RC4-like routine) which makes auditing difficult and is a supply-chain red flag. Functionally, the snippet does not show typical malicious actions (unknown domains, credential exfiltration beyond sending tokens to graph.facebook.com, remote shells, or eval-based execution). Treat the package with caution due to obfuscation; if using in production, prefer unobfuscated, reviewed source or vendor-verified package versions and ensure access tokens are scoped and rotated.

rain-ai

0.1.12

Live on pypi

Blocked by Socket

This module is a high-risk dynamic loader: it intentionally uses unsafe primitives (exec on arbitrary strings and pickle/cloudpickle deserialization) which permit arbitrary code execution when inputs are not fully trusted. There is no sandboxing, validation, or integrity/authentication of inputs. Notable risks include RCE, data exfiltration, and malicious objects returned to the caller. Use only with strictly trusted and integrity-verified inputs (e.g., signed code or stored artifacts from a secure build pipeline). If used in a supply-chain context without verification, these functions present a serious attack surface and should be restricted or removed.

oobe-protocol

1.6.4

by ethercode_0xkpt

Removed from npm

Blocked by Socket

The source code does not contain malware or obfuscated code. However, it contains a serious security risk due to hardcoded private keys and API keys embedded in the source. This practice can lead to credential leakage, unauthorized access to blockchain wallets, and abuse of API services. It is strongly recommended to remove these secrets from the code and use secure environment variables or secret management solutions instead. The reported '[object Promise]' outputs are invalid and provide no useful information. Overall, the code is not malicious but poses a significant security risk.

Live on npm for 25 minutes before removal. Socket users were protected even while the package was live.

richardtmiles/carbonphp

13.7.6

Live on composer

Blocked by Socket

The codebase acts as an aggressive deployment automation tool with webhook-driven updates and high-privilege system modifications. The presence of hard-coded credentials, elevation of privileges, and dynamic configuration changes create substantial supply chain and operational security risks. It should not be used in public projects or unattended environments without refactoring to remove secrets, remove interactive prompts, enforce least privilege, and ensure formal authentication/authorization for webhook-triggered actions.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Git dependency

GitHub dependency

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

Telemetry

Protestware or potentially unwanted behavior

Unstable ownership

55 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a Demo

Questions? Call us at (844) SOCKET-0

Read the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles