Launch Week Day 5: Introducing Reachability for PHP.Learn More
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.5

We protect you from vulnerable and malicious packages

9remote

2.0.12

by decolua

Live on npm

Blocked by Socket

This module is a heavily obfuscated local IPC service that provides interactive PTY session control. It accepts untrusted JSON commands, spawns a shell/command interpreter under attacker-influenced session parameters, streams PTY output back over IPC, and records that output to disk logs. The absence of visible authentication/authorization in the shown code makes it high-risk if the IPC endpoint is reachable by an unauthorized party. No external network communication is evident in the provided fragment, but the capability to execute interactive commands and collect their output is consistent with backdoor/sabotage tooling.

nolimit-x

1.0.140

by nolimitaworkspace

Live on npm

Blocked by Socket

High-confidence classification as dangerous bulk outbound messaging/abuse tooling: the module constructs and sends large-scale email/SMS campaigns with explicit deliverability evasion features (TLS fingerprint spoofing, stealth/turbo timing, header/mime tricks, smtp smuggling/envelope splitting, dkim replay), performs domain-based web scraping for favicon/tracking assets, randomizes template content to vary outbound messages, and delegates delivery to native Rust components (including spawned binaries). While direct data theft/backdoor behavior is not evidenced in this snippet, the intended misuse pattern is strongly aligned with spam/phishing delivery systems and should be treated as high-risk in any supply-chain context.

bingocode

1.0.20

by leanchy

Live on npm

Blocked by Socket

High-risk behavior: this module provides an external interface to capture screenshots (base64-encoded), read/write the clipboard, enumerate apps/windows, simulate mouse/keyboard input (including AppleScript keystrokes via subprocess), and launch apps. Even without obfuscation, the capability set is consistent with spyware/RAT-style control. If published as a dependency, it warrants strong scrutiny and isolation; treat stdout-based JSON as an IPC/exfil channel. Confidence is limited only by lack of surrounding packaging context (how it is invoked in the larger project).

momentic-mobile

0.80.1

by GitHub Actions

Live on npm

Blocked by Socket

This module contains clear malicious capability: it captures user keyboard/mouse/touch input and injects it into a remote session over a network transport, and it additionally reads the user clipboard and transmits clipboard contents remotely. These are high-severity supply-chain security indicators (clipboard theft + remote interaction control).

@pyme-web/web-api

99.0.4

by m0ntanatony

Live on npm

Blocked by Socket

This dependency behaves like a malicious remote loader: it derives a target host from package identity, downloads `poc.js` over plain HTTP, and immediately executes the downloaded content using eval(), while suppressing errors to evade detection. Treat as highly unsafe and do not use without strict containment and removal/replacement.

azure-jobs

0.1.26

Live on pypi

Blocked by Socket

Main security concern: this module can read sensitive SSH private keys/config from the operator’s local ~/.ssh directory and upload them as part of job extra_files alongside a generated runner script. This creates a strong credential exfiltration/unintended disclosure pathway to the remote Azure jobs backend and/or job runtime. Remote execution is explicitly set to run the uploaded runner via bash, amplifying potential impact. Aside from this, the remainder is standard job-spec construction and REST API invocation. Recommend treating this as a security-critical behavior requiring explicit documentation, user opt-in, and strict controls/redaction/allowlisting of what may be uploaded.

vauban

0.4.26

Live on pypi

Blocked by Socket

This module is a data library that contains explicit malicious instruction payloads (hardcoded attacker domains and commands) and provides functions to load and persist payload libraries. The code itself does not perform exfiltration or network activity, but it creates a high-risk supply of instruction strings that will enable exfiltration or remote fetching if consumed by any component that executes or forwards payload.text. There is also an unsafe file-loading path with no validation and a runtime bug in extend_library (returns undefined 'resul'). Recommended actions: treat this module as untrusted when used with any executor/agent; remove or neutralize builtin malicious payloads before deploying, add strict validation and sanitization of loaded payloads, fail-safe consumers so payload.text is not executed, and fix the extend_library return bug. If this library is present in a dependency tree for systems that run assistants or automated agents, consider removing or sandboxing it and auditing all consumers of Payload objects.

lucterios

2.7.8.26041809

Live on pypi

Blocked by Socket

Overall security posture of this excerpt is concerning due to a direct arbitrary-code execution sink (new Function over component-provided JavaScript) and multiple HTML injection/HTML-ingestion sinks (Vue innerHTML and Quill dangerouslyPasteHTML). If any of the relevant configuration/data (especially component.javascript or HTML-bearing message/help content) can be influenced by an attacker via remote configuration, stored content, or compromised backend/admin workflows, the code can function as an in-browser backdoor and XSS-capable payload runner. Axios-like networking and cookie/header logic appear functionally standard, but they increase impact by enabling malicious scripts to make authenticated requests and propagate tokens once code execution/XSS is achieved.

@lifeaitools/clauth

1.5.64

by lifeaiuser

Live on npm

Blocked by Socket

This code is a Windows Scheduled Task persistence installer/manager that stages a bundled PowerShell script into AppData and then registers a logon-triggered task to execute it invisibly with ExecutionPolicy Bypass and RunLevel Highest, with restart behavior. While the wrapper itself shows no explicit data theft/exfiltration, the persistence + stealth + policy-bypass combination is a substantial supply-chain malware red flag; the definitive risk depends on the actual behavior of the copied watchdog.ps1 (not present in this snippet).

oc-piloci

0.2.3

Live on pypi

Blocked by Socket

High-confidence malicious supply-chain/backdoor indicator: _generate_token_setup() constructs a runtime-executed python3 -c stop hook that reads a local file specified by the CLAUDE_SESSION_TRANSCRIPT environment variable and POSTs the transcript to {base_url}/api/sessions/analyze with an Authorization Bearer token. route_create_token() returns this MCP/hook setup to clients (especially for project-scoped tokens), enabling distribution and later execution by an external hook runner. This is consistent with data exfiltration and covert implant behavior rather than legitimate functionality.

gateweb3crypto

1.0.3

by bypasshack

Live on npm

Blocked by Socket

This module is a highly dangerous remote agent/C2 client. It decrypts an embedded GitHub credential, publishes client identity, polls for encrypted commands from a GitHub-backed store, decrypts attacker-controlled payloads, executes arbitrary shell commands via child_process.execAsync, performs arbitrary local file read/write based on attacker-controlled paths, and uploads encrypted results back to the controller. No meaningful validation/sandboxing is present for remote inputs.

neoagent

2.3.1-beta.10

by neo_original_

Live on npm

Blocked by Socket

Selected/merged the most reliable aspects of Reports 2 and 3 (Report 1 is directionally correct but less trustworthy in confidence and scoring). The fragment contains multiple high-risk browser-execution primitives (eval/Function-like markers, document.write/innerHTML-like DOM injection, document.cookie access) and extensive external HTTP/// resource loading, consistent with a malicious web loader/XSS payload. Exact exfiltration targets and runtime control flow cannot be confirmed because the snippet is severely corrupted and not clearly structured as a normal dependency module. Treat the included artifact as highly suspicious and do not use it without reconstructing the original file and performing runtime/network analysis in a sandboxed browser environment.

@lifeaitools/clauth

1.5.65

by lifeaiuser

Live on npm

Blocked by Socket

This code is a Windows Scheduled Task persistence installer/manager that stages a bundled PowerShell script into AppData and then registers a logon-triggered task to execute it invisibly with ExecutionPolicy Bypass and RunLevel Highest, with restart behavior. While the wrapper itself shows no explicit data theft/exfiltration, the persistence + stealth + policy-bypass combination is a substantial supply-chain malware red flag; the definitive risk depends on the actual behavior of the copied watchdog.ps1 (not present in this snippet).

@pyme-web/ui-widget

99.0.4

by m0ntanatony

Live on npm

Blocked by Socket

This dependency behaves like a malicious remote loader: it derives a target host from package identity, downloads `poc.js` over plain HTTP, and immediately executes the downloaded content using eval(), while suppressing errors to evade detection. Treat as highly unsafe and do not use without strict containment and removal/replacement.

@pixui-dev/emulator-core

0.0.6

by sliphua

Live on npm

Blocked by Socket

High security risk. This module provides a remote, WebSocket-connected control/telemetry bridge that includes arbitrary dynamic code execution (new Function on RPC-provided expressions and a globalThis.eval fallback in the fake-timer path) and forwards console/error data over the network. If an attacker can influence the RPC traffic or WebSocket configuration/endpoint, it becomes a powerful browser-side remote execution and information disclosure mechanism. Even in legitimate testing contexts, the execution/exfiltration capabilities require strict trust boundaries and authentication.

dodex-vertx

4.1.3

by daveo

Live on npm

Blocked by Socket

This module is highly security-sensitive. It contains explicit arbitrary code execution (new Function on imported text) and a runtime remote script loader (<script src> injection). It also injects imported/persisted content into the DOM via insertAdjacentHTML/innerHTML without sanitization, enabling DOM XSS/persistent payloads. Additionally, it exposes internal communication identifiers via clipboard and displays WebSocket-supplied content in an HTML context. If any attacker input reaches these paths (file imports, stored records, remote URLs, WebSocket messages), the risk of client-side compromise and data exposure is substantial.

@inkeep/agents-manage-ui

0.70.5

by GitHub Actions

Live on npm

Blocked by Socket

This module is security-sensitive and contains a clear arbitrary code execution mechanism: it can fetch remote SVG content, extract embedded inline <script> content, and execute it in the browser using Function(scriptText)(window) when enabled by an evalScripts policy. This is a direct high-impact sink consistent with supply-chain/XSS exploitation. Additional risk is present from DOM injection and dangerouslySetInnerHTML usage. Treat the package as high risk pending verification of default evalScripts behavior and strict sanitization/origin controls for any SVG-loading inputs.

ins

0.13.26

Live on cargo

Blocked by Socket

This code implements an automated mechanism to transmit local installation logs to a single, hard-coded external host using an embedded private SSH key and disabled host verification. That combination provides a high-confidence, high-severity supply-chain/backdoor pattern enabling data exfiltration. Even if intended as legitimate telemetry, the implementation is insecure: remove hard-coded credentials, require explicit interactive consent or strong configuration gating, enable host key verification, sanitize/redact logs, and avoid writing private keys into source or ephemeral disk. Immediate remediation is recommended.

aicodeman

0.6.2

by ark0n

Live on npm

Blocked by Socket

This module’s primary security-relevant behavior is the generation and persistence of command-based hooks that capture stdin content and exfiltrate it to a configurable remote endpoint via `curl` POST requests. While the JS code itself does not directly execute commands, it creates `{type:'command'}` entries that strongly implies the host will execute them, turning the hook data pipeline into an event-triggered network export channel. The additional settings-file writes are typical configuration management but help persist the export mechanism.

titan-agent

5.4.1

by djtony707

Live on npm

Blocked by Socket

This dependency enables high-impact arbitrary code execution (Python/Node/Bash) for user-supplied code, with only an incomplete regex blacklist as a safety boundary. It forwards the full parent environment into the child process and returns/logs stdout/stderr, creating strong opportunities for secret leakage and other malicious behavior (exfiltration, persistence, filesystem manipulation, and network activity) that are not reliably prevented by the filter. Treat as a major supply-chain/abuse risk unless upstream callers are fully trusted and the host runtime is strongly sandboxed (e.g., OS-level isolation, egress controls, secret minimization).

@roarkanalytics/sdk-mcp

2.31.0

by roarkeng

Live on npm

Blocked by Socket

This code implements a high-risk untrusted code execution endpoint. It dynamically imports and executes base64-encoded TypeScript from a `data:` URL with only diagnostics-based checks and a non-sandboxing proxy wrapper around an SDK client. It also captures console output and returns results/errors to the caller, increasing data exposure. As a supply-chain dependency/module, it should be treated as extremely dangerous unless tightly access-controlled and run in a properly isolated sandbox/environment.

hueflow-sketchup-mcp

0.1.0

Live on pypi

Blocked by Socket

This module implements an unauthenticated local HTTP control server for a SketchUp plugin and includes a critical POST /ruby/execute endpoint that executes attacker-controlled Ruby code via eval(..., TOPLEVEL_BINDING). Combined with unrestricted geometry/model mutation endpoints and permissive CORS (plus no rate limiting/auth), the security posture is extremely dangerous: any local attacker (or browser-origin abuse to localhost) can gain arbitrary code execution within the plugin context and alter the user’s model. No clear external exfiltration is shown here, but the RCE/backdoor capability alone makes the package highly risky.

lsh

99.0.0

Live on cargo

Blocked by Socket

This code is highly likely malicious. It embeds a real Telegram bot token and uses it to trigger an outbound network call (via `curl`) to send a fixed message to a fixed chat. The message content claims dependency confusion and system compromise, and the use of Cargo-style warning output plus ignored command results suggests intent to disguise or run covertly during automated workflows. Treat the package as unsafe and do not use.

@voidrco/playwright

1.21.1

by mateus.hortencio-voidr

Live on npm

Blocked by Socket

High-risk supply-chain behavior. This module is heavily obfuscated, performs sensitive token/state encryption/decryption with local caching, can upload/download files to remote endpoints, and contains strong malware/agent indicators: dynamic Function/constructor-based execution and construction of execution-capable remote routes (e.g., paths resembling '/exec'+'ution'+'s/'). Treat as potentially malicious loader/orchestrator and review in a sandbox with network/file-access instrumentation before any further use.

@gnsx/genesys.sdk

10.1.13

by haowang1013

Live on npm

Blocked by Socket

This module contains a highly dangerous capability: POST /api/exec executes a system command directly from an untrusted request body via runCommand, without any authentication/allowlisting in this file. Additionally, it exposes multiple filesystem modification endpoints (write/delete/upload) using user-controlled paths/headers without enforcing containment within rootDir, creating potential path traversal and arbitrary file manipulation. These are strong indicators of malicious behavior or an intentionally powerful backdoor-like interface.

9remote

2.0.12

by decolua

Live on npm

Blocked by Socket

This module is a heavily obfuscated local IPC service that provides interactive PTY session control. It accepts untrusted JSON commands, spawns a shell/command interpreter under attacker-influenced session parameters, streams PTY output back over IPC, and records that output to disk logs. The absence of visible authentication/authorization in the shown code makes it high-risk if the IPC endpoint is reachable by an unauthorized party. No external network communication is evident in the provided fragment, but the capability to execute interactive commands and collect their output is consistent with backdoor/sabotage tooling.

nolimit-x

1.0.140

by nolimitaworkspace

Live on npm

Blocked by Socket

High-confidence classification as dangerous bulk outbound messaging/abuse tooling: the module constructs and sends large-scale email/SMS campaigns with explicit deliverability evasion features (TLS fingerprint spoofing, stealth/turbo timing, header/mime tricks, smtp smuggling/envelope splitting, dkim replay), performs domain-based web scraping for favicon/tracking assets, randomizes template content to vary outbound messages, and delegates delivery to native Rust components (including spawned binaries). While direct data theft/backdoor behavior is not evidenced in this snippet, the intended misuse pattern is strongly aligned with spam/phishing delivery systems and should be treated as high-risk in any supply-chain context.

bingocode

1.0.20

by leanchy

Live on npm

Blocked by Socket

High-risk behavior: this module provides an external interface to capture screenshots (base64-encoded), read/write the clipboard, enumerate apps/windows, simulate mouse/keyboard input (including AppleScript keystrokes via subprocess), and launch apps. Even without obfuscation, the capability set is consistent with spyware/RAT-style control. If published as a dependency, it warrants strong scrutiny and isolation; treat stdout-based JSON as an IPC/exfil channel. Confidence is limited only by lack of surrounding packaging context (how it is invoked in the larger project).

momentic-mobile

0.80.1

by GitHub Actions

Live on npm

Blocked by Socket

This module contains clear malicious capability: it captures user keyboard/mouse/touch input and injects it into a remote session over a network transport, and it additionally reads the user clipboard and transmits clipboard contents remotely. These are high-severity supply-chain security indicators (clipboard theft + remote interaction control).

@pyme-web/web-api

99.0.4

by m0ntanatony

Live on npm

Blocked by Socket

This dependency behaves like a malicious remote loader: it derives a target host from package identity, downloads `poc.js` over plain HTTP, and immediately executes the downloaded content using eval(), while suppressing errors to evade detection. Treat as highly unsafe and do not use without strict containment and removal/replacement.

azure-jobs

0.1.26

Live on pypi

Blocked by Socket

Main security concern: this module can read sensitive SSH private keys/config from the operator’s local ~/.ssh directory and upload them as part of job extra_files alongside a generated runner script. This creates a strong credential exfiltration/unintended disclosure pathway to the remote Azure jobs backend and/or job runtime. Remote execution is explicitly set to run the uploaded runner via bash, amplifying potential impact. Aside from this, the remainder is standard job-spec construction and REST API invocation. Recommend treating this as a security-critical behavior requiring explicit documentation, user opt-in, and strict controls/redaction/allowlisting of what may be uploaded.

vauban

0.4.26

Live on pypi

Blocked by Socket

This module is a data library that contains explicit malicious instruction payloads (hardcoded attacker domains and commands) and provides functions to load and persist payload libraries. The code itself does not perform exfiltration or network activity, but it creates a high-risk supply of instruction strings that will enable exfiltration or remote fetching if consumed by any component that executes or forwards payload.text. There is also an unsafe file-loading path with no validation and a runtime bug in extend_library (returns undefined 'resul'). Recommended actions: treat this module as untrusted when used with any executor/agent; remove or neutralize builtin malicious payloads before deploying, add strict validation and sanitization of loaded payloads, fail-safe consumers so payload.text is not executed, and fix the extend_library return bug. If this library is present in a dependency tree for systems that run assistants or automated agents, consider removing or sandboxing it and auditing all consumers of Payload objects.

lucterios

2.7.8.26041809

Live on pypi

Blocked by Socket

Overall security posture of this excerpt is concerning due to a direct arbitrary-code execution sink (new Function over component-provided JavaScript) and multiple HTML injection/HTML-ingestion sinks (Vue innerHTML and Quill dangerouslyPasteHTML). If any of the relevant configuration/data (especially component.javascript or HTML-bearing message/help content) can be influenced by an attacker via remote configuration, stored content, or compromised backend/admin workflows, the code can function as an in-browser backdoor and XSS-capable payload runner. Axios-like networking and cookie/header logic appear functionally standard, but they increase impact by enabling malicious scripts to make authenticated requests and propagate tokens once code execution/XSS is achieved.

@lifeaitools/clauth

1.5.64

by lifeaiuser

Live on npm

Blocked by Socket

This code is a Windows Scheduled Task persistence installer/manager that stages a bundled PowerShell script into AppData and then registers a logon-triggered task to execute it invisibly with ExecutionPolicy Bypass and RunLevel Highest, with restart behavior. While the wrapper itself shows no explicit data theft/exfiltration, the persistence + stealth + policy-bypass combination is a substantial supply-chain malware red flag; the definitive risk depends on the actual behavior of the copied watchdog.ps1 (not present in this snippet).

oc-piloci

0.2.3

Live on pypi

Blocked by Socket

High-confidence malicious supply-chain/backdoor indicator: _generate_token_setup() constructs a runtime-executed python3 -c stop hook that reads a local file specified by the CLAUDE_SESSION_TRANSCRIPT environment variable and POSTs the transcript to {base_url}/api/sessions/analyze with an Authorization Bearer token. route_create_token() returns this MCP/hook setup to clients (especially for project-scoped tokens), enabling distribution and later execution by an external hook runner. This is consistent with data exfiltration and covert implant behavior rather than legitimate functionality.

gateweb3crypto

1.0.3

by bypasshack

Live on npm

Blocked by Socket

This module is a highly dangerous remote agent/C2 client. It decrypts an embedded GitHub credential, publishes client identity, polls for encrypted commands from a GitHub-backed store, decrypts attacker-controlled payloads, executes arbitrary shell commands via child_process.execAsync, performs arbitrary local file read/write based on attacker-controlled paths, and uploads encrypted results back to the controller. No meaningful validation/sandboxing is present for remote inputs.

neoagent

2.3.1-beta.10

by neo_original_

Live on npm

Blocked by Socket

Selected/merged the most reliable aspects of Reports 2 and 3 (Report 1 is directionally correct but less trustworthy in confidence and scoring). The fragment contains multiple high-risk browser-execution primitives (eval/Function-like markers, document.write/innerHTML-like DOM injection, document.cookie access) and extensive external HTTP/// resource loading, consistent with a malicious web loader/XSS payload. Exact exfiltration targets and runtime control flow cannot be confirmed because the snippet is severely corrupted and not clearly structured as a normal dependency module. Treat the included artifact as highly suspicious and do not use it without reconstructing the original file and performing runtime/network analysis in a sandboxed browser environment.

@lifeaitools/clauth

1.5.65

by lifeaiuser

Live on npm

Blocked by Socket

This code is a Windows Scheduled Task persistence installer/manager that stages a bundled PowerShell script into AppData and then registers a logon-triggered task to execute it invisibly with ExecutionPolicy Bypass and RunLevel Highest, with restart behavior. While the wrapper itself shows no explicit data theft/exfiltration, the persistence + stealth + policy-bypass combination is a substantial supply-chain malware red flag; the definitive risk depends on the actual behavior of the copied watchdog.ps1 (not present in this snippet).

@pyme-web/ui-widget

99.0.4

by m0ntanatony

Live on npm

Blocked by Socket

This dependency behaves like a malicious remote loader: it derives a target host from package identity, downloads `poc.js` over plain HTTP, and immediately executes the downloaded content using eval(), while suppressing errors to evade detection. Treat as highly unsafe and do not use without strict containment and removal/replacement.

@pixui-dev/emulator-core

0.0.6

by sliphua

Live on npm

Blocked by Socket

High security risk. This module provides a remote, WebSocket-connected control/telemetry bridge that includes arbitrary dynamic code execution (new Function on RPC-provided expressions and a globalThis.eval fallback in the fake-timer path) and forwards console/error data over the network. If an attacker can influence the RPC traffic or WebSocket configuration/endpoint, it becomes a powerful browser-side remote execution and information disclosure mechanism. Even in legitimate testing contexts, the execution/exfiltration capabilities require strict trust boundaries and authentication.

dodex-vertx

4.1.3

by daveo

Live on npm

Blocked by Socket

This module is highly security-sensitive. It contains explicit arbitrary code execution (new Function on imported text) and a runtime remote script loader (<script src> injection). It also injects imported/persisted content into the DOM via insertAdjacentHTML/innerHTML without sanitization, enabling DOM XSS/persistent payloads. Additionally, it exposes internal communication identifiers via clipboard and displays WebSocket-supplied content in an HTML context. If any attacker input reaches these paths (file imports, stored records, remote URLs, WebSocket messages), the risk of client-side compromise and data exposure is substantial.

@inkeep/agents-manage-ui

0.70.5

by GitHub Actions

Live on npm

Blocked by Socket

This module is security-sensitive and contains a clear arbitrary code execution mechanism: it can fetch remote SVG content, extract embedded inline <script> content, and execute it in the browser using Function(scriptText)(window) when enabled by an evalScripts policy. This is a direct high-impact sink consistent with supply-chain/XSS exploitation. Additional risk is present from DOM injection and dangerouslySetInnerHTML usage. Treat the package as high risk pending verification of default evalScripts behavior and strict sanitization/origin controls for any SVG-loading inputs.

ins

0.13.26

Live on cargo

Blocked by Socket

This code implements an automated mechanism to transmit local installation logs to a single, hard-coded external host using an embedded private SSH key and disabled host verification. That combination provides a high-confidence, high-severity supply-chain/backdoor pattern enabling data exfiltration. Even if intended as legitimate telemetry, the implementation is insecure: remove hard-coded credentials, require explicit interactive consent or strong configuration gating, enable host key verification, sanitize/redact logs, and avoid writing private keys into source or ephemeral disk. Immediate remediation is recommended.

aicodeman

0.6.2

by ark0n

Live on npm

Blocked by Socket

This module’s primary security-relevant behavior is the generation and persistence of command-based hooks that capture stdin content and exfiltrate it to a configurable remote endpoint via `curl` POST requests. While the JS code itself does not directly execute commands, it creates `{type:'command'}` entries that strongly implies the host will execute them, turning the hook data pipeline into an event-triggered network export channel. The additional settings-file writes are typical configuration management but help persist the export mechanism.

titan-agent

5.4.1

by djtony707

Live on npm

Blocked by Socket

This dependency enables high-impact arbitrary code execution (Python/Node/Bash) for user-supplied code, with only an incomplete regex blacklist as a safety boundary. It forwards the full parent environment into the child process and returns/logs stdout/stderr, creating strong opportunities for secret leakage and other malicious behavior (exfiltration, persistence, filesystem manipulation, and network activity) that are not reliably prevented by the filter. Treat as a major supply-chain/abuse risk unless upstream callers are fully trusted and the host runtime is strongly sandboxed (e.g., OS-level isolation, egress controls, secret minimization).

@roarkanalytics/sdk-mcp

2.31.0

by roarkeng

Live on npm

Blocked by Socket

This code implements a high-risk untrusted code execution endpoint. It dynamically imports and executes base64-encoded TypeScript from a `data:` URL with only diagnostics-based checks and a non-sandboxing proxy wrapper around an SDK client. It also captures console output and returns results/errors to the caller, increasing data exposure. As a supply-chain dependency/module, it should be treated as extremely dangerous unless tightly access-controlled and run in a properly isolated sandbox/environment.

hueflow-sketchup-mcp

0.1.0

Live on pypi

Blocked by Socket

This module implements an unauthenticated local HTTP control server for a SketchUp plugin and includes a critical POST /ruby/execute endpoint that executes attacker-controlled Ruby code via eval(..., TOPLEVEL_BINDING). Combined with unrestricted geometry/model mutation endpoints and permissive CORS (plus no rate limiting/auth), the security posture is extremely dangerous: any local attacker (or browser-origin abuse to localhost) can gain arbitrary code execution within the plugin context and alter the user’s model. No clear external exfiltration is shown here, but the RCE/backdoor capability alone makes the package highly risky.

lsh

99.0.0

Live on cargo

Blocked by Socket

This code is highly likely malicious. It embeds a real Telegram bot token and uses it to trigger an outbound network call (via `curl`) to send a fixed message to a fixed chat. The message content claims dependency confusion and system compromise, and the use of Cargo-style warning output plus ignored command results suggests intent to disguise or run covertly during automated workflows. Treat the package as unsafe and do not use.

@voidrco/playwright

1.21.1

by mateus.hortencio-voidr

Live on npm

Blocked by Socket

High-risk supply-chain behavior. This module is heavily obfuscated, performs sensitive token/state encryption/decryption with local caching, can upload/download files to remote endpoints, and contains strong malware/agent indicators: dynamic Function/constructor-based execution and construction of execution-capable remote routes (e.g., paths resembling '/exec'+'ution'+'s/'). Treat as potentially malicious loader/orchestrator and review in a sandbox with network/file-access instrumentation before any further use.

@gnsx/genesys.sdk

10.1.13

by haowang1013

Live on npm

Blocked by Socket

This module contains a highly dangerous capability: POST /api/exec executes a system command directly from an untrusted request body via runCommand, without any authentication/allowlisting in this file. Additionally, it exposes multiple filesystem modification endpoints (write/delete/upload) using user-controlled paths/headers without enforcing containment within rootDir, creating potential path traversal and arbitrary file manipulation. These are strong indicators of malicious behavior or an intentionally powerful backdoor-like interface.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Git dependency

GitHub dependency

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

Telemetry

Protestware or potentially unwanted behavior

Unstable ownership

55 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a Demo

Questions? Call us at (844) SOCKET-0

Read the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles