Launch Week Day 5: Introducing Reachability for PHP.Learn More
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.5

We protect you from vulnerable and malicious packages

vk-spammer

1.2.5

Live on pypi

Blocked by Socket

This module is an automated VK spamming tool. It collects user credentials or token and optionally persists them unencrypted to ~/.vk-spammer/auth.dat, automates message sending to a specific target, all friends, or all online friends, and can integrate with an anti-captcha service to bypass challenges. There is no evidence of stealthy data exfiltration beyond VK API actions, but the script enables abusive actions and poses a high operational and privacy risk. Treat as malicious/abusive software; do not run with real credentials. Consider removing/quarantining credential files and revoking the VK token/password if used.

sbcli-dev

5.0.5

Live on pypi

Blocked by Socket

This module implements privileged node and device management and exposes HTTP endpoints that accept user input used directly in shell commands and Docker operations. Main risks: command injection (unsanitized string interpolation into shell commands and os.popen), destructive device operations (partitioning, bind/unbind), supplying arbitrary images to be pulled and run as privileged containers, and use of an unencrypted/unprotected Docker TCP socket (tcp://...:2375). I assess this as not manifestly malware but a high-risk administrative component that must be strictly access-controlled and hardened (validate/sanitize inputs, avoid passing raw user values into shell/Docker operations, use secure Docker API access, avoid exposing endpoints publicly).

aspidites

1.3.6

Live on pypi

Blocked by Socket

The code implements a high-risk dynamic evaluation pattern by evaluating tokens within the caller’s scope. This creates a strong possibility of arbitrary code execution and data leakage if tokens originate from untrusted inputs. Hardening should include removing eval, replacing with safe resolvers, sandboxing, or strict token whitelisting and restricting scope access. This pattern is unsuitable for trusted libraries exposes in open-source supply chains without significant safeguards.

survivor-io-free-codes-and-how-to-redeem-them-september-2022-463

1.0.2

by mskhadijaakther403

Removed from npm

Blocked by Socket

The code exhibits several concerning behaviors, including the use of hardcoded credentials, subprocess execution with potential for command injection, and interactions with external websites. These activities pose a significant security risk and should be further investigated.

Live on npm for 15 hours and 55 minutes before removal. Socket users were protected even while the package was live.

github.com/yaklang/yaklang

v1.3.7-beta4.0.20241104053327-bc6669099df6

Live on go

Blocked by Socket

WebLogic CORBA/IIOP exploitation framework containing hardcoded exploit payloads for binding/rebinding remote objects and executing remote constructor payloads. The code implements multi-stage attacks including backdoor installation capabilities through serialized Java bytecode injection. Contains embedded hex-encoded payloads targeting WebLogic internal classes (weblogic[.]corba[.]cos[.]naming[.]NamingContextAny) and CORBA naming contexts. Functionality includes remote command execution through getServerLocation method calls and JNDI manipulation attacks. While this is legitimate penetration testing code within a security framework, the presence of ready-to-use exploit payloads and backdoor installation mechanisms represents unusual patterns that security tools should flag for review.

dnszlsk/muad-dib

7d64e80bab45e6d5a0b4e75ed89b0b5347075ce9

Live on actions

Blocked by Socket

This code is strongly consistent with a malicious dropper/loader: it fetches an external platform-specific binary from a hardcoded remote endpoint, writes it to a hidden temp file, marks it executable, and runs it detached with suppressed output. The absence of integrity/authenticity verification and the silent error handling further increase the likelihood of harmful behavior. Recommend treating this package/module as malicious unless strong provenance and verification controls are demonstrated externally.

pinokiod

3.2.20

by cocktailpeanut

Live on npm

Blocked by Socket

The SweetAlert2 library code is mostly benign and serves as a UI modal dialog tool. However, it contains a suspicious and potentially malicious snippet that targets Russian users on certain domains to play an unsolicited audio prank, disabling pointer events and potentially disrupting user interaction. This behavior is unexpected and should be considered a moderate security risk and potential malware. The rest of the code shows no signs of malicious intent. The provided reports were invalid and unhelpful. Users should be cautious about this version of the library due to the embedded prank behavior.

instaspam2

1.0

Live on pypi

Blocked by Socket

This script is malicious/abusive. It is designed to perform Instagram spam and concurrently exfiltrate credentials, target metadata and the host public IP to a hardcoded Discord webhook. It also contains mechanisms to delete local files and fetch/execute remote code, enabling supply-chain/remote-code-execution threats. Do not run this code. Treat any systems where it ran or credentials entered into it as compromised: rotate exposed credentials, inspect/restore affected hosts, and block the webhook endpoint and network indicators.

thispackagedoesnotexist

0.7.7

Removed from pypi

Blocked by Socket

This file contains code that systematically locates browser data directories, decrypts stored credentials and credit card information, and extracts cookies. It then prepares the captured data (encoding it in base64 and bundling it into archives) for potential transmission to a remote destination. The script also interfaces with a local debugging port to obtain additional private information, employing techniques indicative of credential-stealing malware. Any references to remote servers or domains (for example, example[.]com) suggest possible exfiltration channels.

Live on pypi for 20 hours and 16 minutes before removal. Socket users were protected even while the package was live.

github-badge-bot

1.8.7

by kingtiger19990427

Live on npm

Blocked by Socket

This module is explicitly designed to harvest Discord authentication tokens from a Windows machine by reading LevelDB data and decrypting DPAPI-protected blobs via PowerShell, plus probing the Windows Credential Manager for Discord entries. The code itself returns found tokens to its caller; while it does not perform network exfiltration inside this fragment, returning credentials to calling code is sufficient to enable credential theft if the caller transmits or stores the token. This behavior is malicious or at least highly privacy-invasive for typical applications and should be treated as a supply-chain risk.

cquai-ml

1.0.2

Live on pypi

Blocked by Socket

The file is an automated traffic/click generator that spawns many worker processes performing continuous, unthrottled HTTP GET requests to two hardcoded endpoints on a specific third‑party site. It is designed to inflate counters or overload the target. While it does not harvest local secrets or contain obvious obfuscation or remote command-and-control, its behavior is malicious/abusive in typical threat models (click fraud / DoS). Do not run this code; treat it as malicious tool usage and remove or block in supply chains.

@liuliang520500/sinataoke_cn

1.1.29

by liuliang520500

Live on npm

Blocked by Socket

This module exhibits strong supply-chain red flags: heavy obfuscation, cross-environment (window+process) adaptation, explicit dynamic code execution via Function(string) with immediate invocation, and process-level event-handler registration/state mutation. The visible logic largely resembles signing/API orchestration with extensive JSON-stringified logging and structured error returns, but the Function/require/process-on capabilities prevent ruling out hidden malicious behavior. Treat this dependency as high-risk pending full deobfuscation and verification of the dynamic execution branch (including the exact Function-string contents), the computed require targets, and any downstream network/transport implementation outside this fragment.

354766/athina-ai/goose-skills/job-posting-intent/

2141dc7e28e59c315654d594b425c1bad50236c1

Live on socket

Blocked by Socket

The code is not simply benign data processing. It builds and transmits a large remote-executable payload to a remote workbench, effectively enabling remote code execution on an external service. Coupled with a hardcoded JWT and dependence on external tooling (googlesheets via the remote workbench), this represents a high opportunity for misuse, data exposure, or control by an attacker if the remote service is compromised or abused. The immediate risk is remote code execution and data leakage via the remote workbench and Google Sheets API, amplified by hardcoded credentials.

@nightwatch/setup-tools

3.0.2

by swrdfish

Live on npm

Blocked by Socket

Suspicious configuration for distributing unofficial mobile applications impersonating Wikipedia through an unconventional and potentially risky distribution method

pyx-core

1.19.0

Live on pypi

Blocked by Socket

This code presents significant security risks through its ability to fetch dependency lists from a suspicious internal Jenkins server and automatically install packages. The hardcoded Jenkins URL, automatic installation capabilities, and lack of proper validation create potential vectors for supply chain attacks and unauthorized package installation.

simplepro

7.20

Live on pypi

Blocked by Socket

This module executes an embedded, obfuscated payload at import time using exec() on the result of LZMA decompression of a base64 blob. That pattern is a high-risk indicator: it prevents static auditing and allows arbitrary actions with the importing process privileges. Without decompressing the payload we cannot categorically state what actions it performs, but the concealment and immediate execution are consistent with malware or other covert behavior. Recommendation: do not import or run this module in production or on sensitive systems; extract and inspect the decompressed payload in an isolated sandbox before any further use.

pygame-buttonspack

1.2.41

Live on pypi

Blocked by Socket

This setup.py performs an explicit, intentional network beacon to an IP-logging service (iplogger.com) during package installation by calling urlopen in readme(), leaking installer IP and header metadata. Combined with an attempt to claim the 'pygame' package namespace and a silent broad exception handler, this is a malicious/spy pattern in a packaging script. Do not install this package; treat it as hostile telemetry/malware and block network access or remove the package from environments.

axios-w-config

0.1.4

by wukaiguo

Live on npm

Blocked by Socket

This code contains an interceptor that conditionally exfiltrates request payloads (specifically requests whose URL contains 'login') to an external EmailJS account using hard-coded service/template/user identifiers. The behavior looks intentionally stealthy (silent try/catch) and is highly likely to leak sensitive credentials. This is a malicious/backdoor-like behavior and the package should not be trusted until removed or verified as intended.

mtxai

0.0.163

Live on pypi

Blocked by Socket

This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.

dpj

3.0.4

Removed from pypi

Blocked by Socket

This code fragment is highly suspicious and appears to be part of a file-encryption tool (ransomware-style) or utility that detects and handles encrypted files. Key risk indicators: hardcoded KDF inputs producing a deterministic key, custom byte-transform encryption function (dpj), scanning/discovery of files recursively, and checking/appending encrypted metadata at file tails. There is no network exfiltration or remote control in the supplied fragment, but local destructive or disruptive behavior (encrypting user files) is strongly suggested. Treat the package as risky and review other modules for actual write/overwrite operations, ransom note creation, or network communications before allowing use in production.

Live on pypi for 21 hours and 21 minutes before removal. Socket users were protected even while the package was live.

xbox-bottomnav

99.9.10

Live on npm

Blocked by Socket

This module constructs a DNS name containing hex-encoded local identifiers (hostname, username, and cwd) combined with a hardcoded external domain and immediately issues a dns.lookup, resulting in outbound DNS queries that leak local information to the operator of the target domain. The code executes on module load, so merely requiring the package will trigger the exfiltration. Treat this as a high-risk supply-chain indicator — do not install or require this package in production; investigate and remove if found as a dependency.

bingo_blitz_bonus_exploredeposit_weebly783

1.0.2

by khadijaakter86628

Live on npm

Blocked by Socket

The code poses a high security risk due to hardcoded credentials and automated publishing, which could be exploited for spamming or malicious distribution. The intent and use of the code are questionable.

txt2boil

0.4

Live on pypi

Blocked by Socket

This code dynamically executes Python taken from comment content labelled 'Python Gen:' by building and eval()-ing a function whose body comes directly from the regex capture. If the 'comm' input can be influenced by an attacker, this is a high-risk remote code execution vector. The group-index remapping makes the capture-to-execution mapping less obvious. Do not use on untrusted input; if this functionality is required, restrict or sanitize inputs, use a safe execution sandbox, or remove dynamic eval altogether.

exp10it

2.4.73

Live on pypi

Blocked by Socket

This module is an offensive pentest/scan/exploitation toolkit that performs network reconnaissance, web crawling, SQLi/webshell/admin brute-forcing, port scanning and brute-force, modifies system files, downloads and executes external tools, and can exfiltrate results via email and GitHub. In a supply-chain context this is dangerous: it runs shell commands, disables TLS verification, uses eval() on config data, stores credentials in cleartext, and performs actions that can be abused for unauthorized access or data exfiltration. I assess it as high security risk and potentially malicious if included unknowingly in a project. Avoid using this package in trusted environments and do not run it on production systems.

vk-spammer

1.2.5

Live on pypi

Blocked by Socket

This module is an automated VK spamming tool. It collects user credentials or token and optionally persists them unencrypted to ~/.vk-spammer/auth.dat, automates message sending to a specific target, all friends, or all online friends, and can integrate with an anti-captcha service to bypass challenges. There is no evidence of stealthy data exfiltration beyond VK API actions, but the script enables abusive actions and poses a high operational and privacy risk. Treat as malicious/abusive software; do not run with real credentials. Consider removing/quarantining credential files and revoking the VK token/password if used.

sbcli-dev

5.0.5

Live on pypi

Blocked by Socket

This module implements privileged node and device management and exposes HTTP endpoints that accept user input used directly in shell commands and Docker operations. Main risks: command injection (unsanitized string interpolation into shell commands and os.popen), destructive device operations (partitioning, bind/unbind), supplying arbitrary images to be pulled and run as privileged containers, and use of an unencrypted/unprotected Docker TCP socket (tcp://...:2375). I assess this as not manifestly malware but a high-risk administrative component that must be strictly access-controlled and hardened (validate/sanitize inputs, avoid passing raw user values into shell/Docker operations, use secure Docker API access, avoid exposing endpoints publicly).

aspidites

1.3.6

Live on pypi

Blocked by Socket

The code implements a high-risk dynamic evaluation pattern by evaluating tokens within the caller’s scope. This creates a strong possibility of arbitrary code execution and data leakage if tokens originate from untrusted inputs. Hardening should include removing eval, replacing with safe resolvers, sandboxing, or strict token whitelisting and restricting scope access. This pattern is unsuitable for trusted libraries exposes in open-source supply chains without significant safeguards.

survivor-io-free-codes-and-how-to-redeem-them-september-2022-463

1.0.2

by mskhadijaakther403

Removed from npm

Blocked by Socket

The code exhibits several concerning behaviors, including the use of hardcoded credentials, subprocess execution with potential for command injection, and interactions with external websites. These activities pose a significant security risk and should be further investigated.

Live on npm for 15 hours and 55 minutes before removal. Socket users were protected even while the package was live.

github.com/yaklang/yaklang

v1.3.7-beta4.0.20241104053327-bc6669099df6

Live on go

Blocked by Socket

WebLogic CORBA/IIOP exploitation framework containing hardcoded exploit payloads for binding/rebinding remote objects and executing remote constructor payloads. The code implements multi-stage attacks including backdoor installation capabilities through serialized Java bytecode injection. Contains embedded hex-encoded payloads targeting WebLogic internal classes (weblogic[.]corba[.]cos[.]naming[.]NamingContextAny) and CORBA naming contexts. Functionality includes remote command execution through getServerLocation method calls and JNDI manipulation attacks. While this is legitimate penetration testing code within a security framework, the presence of ready-to-use exploit payloads and backdoor installation mechanisms represents unusual patterns that security tools should flag for review.

dnszlsk/muad-dib

7d64e80bab45e6d5a0b4e75ed89b0b5347075ce9

Live on actions

Blocked by Socket

This code is strongly consistent with a malicious dropper/loader: it fetches an external platform-specific binary from a hardcoded remote endpoint, writes it to a hidden temp file, marks it executable, and runs it detached with suppressed output. The absence of integrity/authenticity verification and the silent error handling further increase the likelihood of harmful behavior. Recommend treating this package/module as malicious unless strong provenance and verification controls are demonstrated externally.

pinokiod

3.2.20

by cocktailpeanut

Live on npm

Blocked by Socket

The SweetAlert2 library code is mostly benign and serves as a UI modal dialog tool. However, it contains a suspicious and potentially malicious snippet that targets Russian users on certain domains to play an unsolicited audio prank, disabling pointer events and potentially disrupting user interaction. This behavior is unexpected and should be considered a moderate security risk and potential malware. The rest of the code shows no signs of malicious intent. The provided reports were invalid and unhelpful. Users should be cautious about this version of the library due to the embedded prank behavior.

instaspam2

1.0

Live on pypi

Blocked by Socket

This script is malicious/abusive. It is designed to perform Instagram spam and concurrently exfiltrate credentials, target metadata and the host public IP to a hardcoded Discord webhook. It also contains mechanisms to delete local files and fetch/execute remote code, enabling supply-chain/remote-code-execution threats. Do not run this code. Treat any systems where it ran or credentials entered into it as compromised: rotate exposed credentials, inspect/restore affected hosts, and block the webhook endpoint and network indicators.

thispackagedoesnotexist

0.7.7

Removed from pypi

Blocked by Socket

This file contains code that systematically locates browser data directories, decrypts stored credentials and credit card information, and extracts cookies. It then prepares the captured data (encoding it in base64 and bundling it into archives) for potential transmission to a remote destination. The script also interfaces with a local debugging port to obtain additional private information, employing techniques indicative of credential-stealing malware. Any references to remote servers or domains (for example, example[.]com) suggest possible exfiltration channels.

Live on pypi for 20 hours and 16 minutes before removal. Socket users were protected even while the package was live.

github-badge-bot

1.8.7

by kingtiger19990427

Live on npm

Blocked by Socket

This module is explicitly designed to harvest Discord authentication tokens from a Windows machine by reading LevelDB data and decrypting DPAPI-protected blobs via PowerShell, plus probing the Windows Credential Manager for Discord entries. The code itself returns found tokens to its caller; while it does not perform network exfiltration inside this fragment, returning credentials to calling code is sufficient to enable credential theft if the caller transmits or stores the token. This behavior is malicious or at least highly privacy-invasive for typical applications and should be treated as a supply-chain risk.

cquai-ml

1.0.2

Live on pypi

Blocked by Socket

The file is an automated traffic/click generator that spawns many worker processes performing continuous, unthrottled HTTP GET requests to two hardcoded endpoints on a specific third‑party site. It is designed to inflate counters or overload the target. While it does not harvest local secrets or contain obvious obfuscation or remote command-and-control, its behavior is malicious/abusive in typical threat models (click fraud / DoS). Do not run this code; treat it as malicious tool usage and remove or block in supply chains.

@liuliang520500/sinataoke_cn

1.1.29

by liuliang520500

Live on npm

Blocked by Socket

This module exhibits strong supply-chain red flags: heavy obfuscation, cross-environment (window+process) adaptation, explicit dynamic code execution via Function(string) with immediate invocation, and process-level event-handler registration/state mutation. The visible logic largely resembles signing/API orchestration with extensive JSON-stringified logging and structured error returns, but the Function/require/process-on capabilities prevent ruling out hidden malicious behavior. Treat this dependency as high-risk pending full deobfuscation and verification of the dynamic execution branch (including the exact Function-string contents), the computed require targets, and any downstream network/transport implementation outside this fragment.

354766/athina-ai/goose-skills/job-posting-intent/

2141dc7e28e59c315654d594b425c1bad50236c1

Live on socket

Blocked by Socket

The code is not simply benign data processing. It builds and transmits a large remote-executable payload to a remote workbench, effectively enabling remote code execution on an external service. Coupled with a hardcoded JWT and dependence on external tooling (googlesheets via the remote workbench), this represents a high opportunity for misuse, data exposure, or control by an attacker if the remote service is compromised or abused. The immediate risk is remote code execution and data leakage via the remote workbench and Google Sheets API, amplified by hardcoded credentials.

@nightwatch/setup-tools

3.0.2

by swrdfish

Live on npm

Blocked by Socket

Suspicious configuration for distributing unofficial mobile applications impersonating Wikipedia through an unconventional and potentially risky distribution method

pyx-core

1.19.0

Live on pypi

Blocked by Socket

This code presents significant security risks through its ability to fetch dependency lists from a suspicious internal Jenkins server and automatically install packages. The hardcoded Jenkins URL, automatic installation capabilities, and lack of proper validation create potential vectors for supply chain attacks and unauthorized package installation.

simplepro

7.20

Live on pypi

Blocked by Socket

This module executes an embedded, obfuscated payload at import time using exec() on the result of LZMA decompression of a base64 blob. That pattern is a high-risk indicator: it prevents static auditing and allows arbitrary actions with the importing process privileges. Without decompressing the payload we cannot categorically state what actions it performs, but the concealment and immediate execution are consistent with malware or other covert behavior. Recommendation: do not import or run this module in production or on sensitive systems; extract and inspect the decompressed payload in an isolated sandbox before any further use.

pygame-buttonspack

1.2.41

Live on pypi

Blocked by Socket

This setup.py performs an explicit, intentional network beacon to an IP-logging service (iplogger.com) during package installation by calling urlopen in readme(), leaking installer IP and header metadata. Combined with an attempt to claim the 'pygame' package namespace and a silent broad exception handler, this is a malicious/spy pattern in a packaging script. Do not install this package; treat it as hostile telemetry/malware and block network access or remove the package from environments.

axios-w-config

0.1.4

by wukaiguo

Live on npm

Blocked by Socket

This code contains an interceptor that conditionally exfiltrates request payloads (specifically requests whose URL contains 'login') to an external EmailJS account using hard-coded service/template/user identifiers. The behavior looks intentionally stealthy (silent try/catch) and is highly likely to leak sensitive credentials. This is a malicious/backdoor-like behavior and the package should not be trusted until removed or verified as intended.

mtxai

0.0.163

Live on pypi

Blocked by Socket

This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.

dpj

3.0.4

Removed from pypi

Blocked by Socket

This code fragment is highly suspicious and appears to be part of a file-encryption tool (ransomware-style) or utility that detects and handles encrypted files. Key risk indicators: hardcoded KDF inputs producing a deterministic key, custom byte-transform encryption function (dpj), scanning/discovery of files recursively, and checking/appending encrypted metadata at file tails. There is no network exfiltration or remote control in the supplied fragment, but local destructive or disruptive behavior (encrypting user files) is strongly suggested. Treat the package as risky and review other modules for actual write/overwrite operations, ransom note creation, or network communications before allowing use in production.

Live on pypi for 21 hours and 21 minutes before removal. Socket users were protected even while the package was live.

xbox-bottomnav

99.9.10

Live on npm

Blocked by Socket

This module constructs a DNS name containing hex-encoded local identifiers (hostname, username, and cwd) combined with a hardcoded external domain and immediately issues a dns.lookup, resulting in outbound DNS queries that leak local information to the operator of the target domain. The code executes on module load, so merely requiring the package will trigger the exfiltration. Treat this as a high-risk supply-chain indicator — do not install or require this package in production; investigate and remove if found as a dependency.

bingo_blitz_bonus_exploredeposit_weebly783

1.0.2

by khadijaakter86628

Live on npm

Blocked by Socket

The code poses a high security risk due to hardcoded credentials and automated publishing, which could be exploited for spamming or malicious distribution. The intent and use of the code are questionable.

txt2boil

0.4

Live on pypi

Blocked by Socket

This code dynamically executes Python taken from comment content labelled 'Python Gen:' by building and eval()-ing a function whose body comes directly from the regex capture. If the 'comm' input can be influenced by an attacker, this is a high-risk remote code execution vector. The group-index remapping makes the capture-to-execution mapping less obvious. Do not use on untrusted input; if this functionality is required, restrict or sanitize inputs, use a safe execution sandbox, or remove dynamic eval altogether.

exp10it

2.4.73

Live on pypi

Blocked by Socket

This module is an offensive pentest/scan/exploitation toolkit that performs network reconnaissance, web crawling, SQLi/webshell/admin brute-forcing, port scanning and brute-force, modifies system files, downloads and executes external tools, and can exfiltrate results via email and GitHub. In a supply-chain context this is dangerous: it runs shell commands, disables TLS verification, uses eval() on config data, stores credentials in cleartext, and performs actions that can be abused for unauthorized access or data exfiltration. I assess it as high security risk and potentially malicious if included unknowingly in a project. Avoid using this package in trusted environments and do not run it on production systems.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Git dependency

GitHub dependency

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

Telemetry

Protestware or potentially unwanted behavior

Unstable ownership

55 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a Demo

Questions? Call us at (844) SOCKET-0

Read the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles