Launch Week Day 5: Introducing Reachability for PHP.Learn More
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.5

We protect you from vulnerable and malicious packages

github.com/sourcegraph/sourcegraph

v0.0.0-20200819165036-3c88d43f1e54

Live on go

Blocked by Socket

This module is a deliberate destructive utility that corrupts all .zip files in a specified directory by truncating each archive to half its size and appending repeated junk data. While it lacks common malware features like networking or data exfiltration, the behavior is strongly indicative of sabotage and would be unacceptable in most software supply-chain contexts due to its potential to break builds, deployments, or artifact integrity.

@focusinyou/delayrandom

1.1.2

by focusinyou

Live on npm

Blocked by Socket

This source contains explicit malicious functionality: an unauthenticated data-exfiltration function that posts caller-supplied data to a suspicious third-party URL, and a timed kill-switch that deliberately disrupts or crashes applications after 2026-02-28. Comments and code both indicate intentional sabotage. Treat the module as malicious: remove from projects, rotate any secrets that may have been passed to formatInfo, audit builds and deployments that included this package, and block the remote host. Do not use this library.

@qingchencloud/openclaw-zh

2026.2.15-nightly.202602171533

Live on npm

Blocked by Socket

The mcporter CLI’s documented capabilities (arbitrary HTTP calls, --stdio process execution, and local credential storage) align with its stated purpose but present a moderate attack surface: misuse can lead to credential leakage or arbitrary code execution if inputs are untrusted or the environment is hostile. The fragment contains no explicit malicious code, obfuscation, or hard-coded attacker infrastructure. Recommended actions: review implementation for secure storage of tokens, minimize or sanitize construction of command strings, consider allowlisting target domains or prompting before sending credentials to unknown endpoints, and audit generated outputs for sensitive data leakage. Treat as functional but moderately risky in adversarial contexts.

@jackshanyeshuzi/curvess

1.1.5

by jackshanyeshuzi

Removed from npm

Blocked by Socket

This code contains a deliberate, obfuscated network exfiltration that sends private key material to an external host during signature preparation. This is a high-confidence backdoor/supply-chain compromise. Do not use this package; consider it malicious and compromised. Replace with a trusted, audited implementation and rotate any keys generated or used by this code.

Live on npm for 9 hours and 17 minutes before removal. Socket users were protected even while the package was live.

uniquebible

0.1.60

Live on pypi

Blocked by Socket

This module implements a GUI chat application that integrates with OpenAI and provides features that allow arbitrary Python and shell command execution based on selected text or user input, and loads plugins from the filesystem. I did not find explicit hardcoded backdoor/network exfiltration to a suspicious external domain. However, the code exposes powerful dangerous sinks (exec, eval, subprocess.run(..., shell=True), os.system) directly to user-supplied or file-supplied content without sandboxing. This is a high security risk for accidental misuse or malicious plugins/content; treat the package as potentially dangerous in contexts where untrusted data or plugins may be present. Recommended mitigation: remove or require explicit confirmation for run-as-command features, sandbox or restrict exec/context, avoid shell=True, avoid eval, and never auto-run plugin code from untrusted locations.

azure-graphrbac

7.6.8

Removed from npm

Blocked by Socket

Possible typosquat of azure - Explanation: The package 'azure-graphrbac' is labeled as a 'security holding package', which often indicates a placeholder to prevent typosquatting. The name 'azure-graphrbac' closely resembles legitimate Azure package naming conventions, which could confuse users. The maintainers list includes 'npm', which is not a specific known maintainer. Therefore, it is likely a typosquat.

Live on npm for 10 hours and 59 minutes before removal. Socket users were protected even while the package was live.

cikuu

2022.3.4

Live on pypi

Blocked by Socket

The service exposes a high-severity remote code execution vulnerability through an unvalidated, user-supplied code parameter that is compiled and evaluated in the host context. This creates a serious backdoor and data-exfiltration risk, compounded by unprotected Redis data access endpoints. Immediate remediation is required: remove or drastically constrain the dynamic eval path, implement authentication/authorization, sanitize inputs, and consider sandboxing or abandoning dynamic code execution entirely.

go-template

0.1.8

Live on npm

Blocked by Socket

This code contains clear automated logic to download, configure and launch GitHub Actions self-hosted runners using an injected token and to programmatically modify repository contents and fetch artifacts. Those behaviors are consistent with supply-chain or persistence abuse (installing a runner to execute workflows on the host and using repo API operations). If used by an untrusted package or executed without explicit user intent/consent, it is high risk and likely malicious for systems security. Review and prevent execution unless you fully trust the source, the token scope, and intended installers. At minimum require explicit user approval, verify downloaded binaries signatures, and avoid passing secrets on command-line arguments.

doughnuts

3.3.1

Live on pypi

Blocked by Socket

This file is exploit tooling: it constructs and sends sophisticated PHP exploit payloads targeting remote PHP servers to achieve arbitrary command execution using memory-corruption primitives, deserialization gadget chains, and multiple execution fallbacks (system/exec/popen/FFI/COM/imap_open). It includes anti-forensics (LD_PRELOAD cleanup), evasion (randomized markers, UA/referer), and numerous OS-specific execution techniques. Treat this as malicious: do not run, remove from trusted dependencies, and investigate supply-chain compromise.

@codebit-programando-solucoes/codebit-llm-coderag

1.1.80

by ksfreitas

Live on npm

Blocked by Socket

This module fragment exhibits strong loader/stager characteristics: heavy obfuscation, a dynamic `Function`/`constructor("return this")()` global-scope escape primitive, and conditional/indirect dispatch with multiple `require(...)` initializations. While the truncated view does not show explicit exfiltration or persistence actions, the capabilities and patterns present warrant treating the package as suspicious and performing a full end-to-end inspection of the required modules and any subsequent stage behaviors.

load-image-meta

9.768.488

Removed from npm

Blocked by Socket

The code is obfuscated and performs actions typical of data exfiltration, such as collecting environment variables and sending them to a remote server. This behavior is indicative of malicious intent.

Live on npm for 1 hour before removal. Socket users were protected even while the package was live.

wix-marketing-backend

2.999.999

Removed from npm

Blocked by Socket

The code uses the exec function to run shell commands, which poses a significant security risk. It could potentially execute malicious code if the input to exec is manipulated. Redirecting output to /dev/null to hide execution details is suspicious.

Live on npm for 4 minutes before removal. Socket users were protected even while the package was live.

@amaster.ai/vite-plugins

1.1.0-beta.72

by 2betop

Live on npm

Blocked by Socket

High-risk data collection/exfiltration behavior: the code monkey-patches fetch and XMLHttpRequest to capture request/response headers and bodies, queues them, and transmits them using navigator.sendBeacon to a /__browser__ endpoint; the server persists the received payload to browser.log. This can leak sensitive application data (tokens, personal data, API responses). No direct RCE/backdoor is evident, but the telemetry exfiltration pipeline is suspicious and security-impacting.

web-bzz

1.10.3

by u4mstof1wsg0t

Removed from npm

Blocked by Socket

The package contains obfuscated code that interacts with an Ethereum smart contract to retrieve a string associated with a wallet address. It uses this string to construct a URL based on the user's operating system and downloads an executable file from that URL. The code then executes the downloaded file in the background without user consent.

Live on npm for 6 days, 10 hours and 47 minutes before removal. Socket users were protected even while the package was live.

@mcp-use/inspector

0.5.3-canary.6

Live on npm

Blocked by Socket

The analyzed fragment exhibits a covert iframe console interception mechanism that exfiltrates console output, Errors, and unhandled rejections to a parent frame via postMessage, using wildcard origins and dynamic iframe injection. This presents a tangible data-leak risk and potential backdoor-like telemetry within a supply-chain context. Treat as high-risk in production and require explicit opt-in, strict origin validation, CSP controls, and removal or isolation of such telemetry patterns from open-source dependencies unless clearly documented and consented by users.

354766/inference-sh/agent-skills-registry/ai-marketing-videos/

c20dce902239d5ccb1638d74de8b4401939c46eb

Live on socket

Blocked by Socket

[Skill Scanner] Pipe-to-shell or eval pattern detected (AITech 9.1.4) [CI013]

tx-engine

0.3.5

Live on pypi

Blocked by Socket

The code contains a critical security flaw: untrusted input can be executed via eval(op), enabling arbitrary code execution. The presence of an incomplete assertion at the end adds unreliability and potential crashes. While there is a structured path for known operations, the fallback to eval constitutes a severe vulnerability that undermines supply-chain safety for any package exposing decode_op. Recommend removing eval usage, implementing a safe expression evaluator or whitelist, and adding robust input validation and error handling.

cuckoo

2.0.7

Live on pypi

Blocked by Socket

The code implements functionality that can exfiltrate arbitrary files and logs over the network without encryption or user consent. This behavior constitutes a significant security risk and matches malware patterns related to data theft. Although the code is not obfuscated and does not contain explicit malware payloads like backdoors or reverse shells, the potential for unauthorized data leakage is high. Use of this code in a supply chain context should be carefully controlled and audited.

clselove

1.23

Live on pypi

Blocked by Socket

This module is high-risk and appears designed for abuse: remote-controlled automation of Android devices and browsers, payload delivery into app private storage, and exfiltration of app data to remote servers. It includes hard-coded API keys and endpoints and runs privileged shell commands (su, adb) to copy and chmod app data. Use of this code in a project poses a significant supply-chain and operational security risk. I recommend not using this package and performing a full audit of any systems where it was installed; credentials and any devices accessible by the environment should be considered compromised.

teachable-machine.js

2.0.1

by nixautservices

Live on npm

Blocked by Socket

The install script is risky and suspicious. It invokes "npm i" during installation which can create recursive install behavior and causes additional lifecycle scripts (preinstall/postinstall) to run unexpectedly. That enables untrusted code execution and supply-chain abuse, and can lead to resource exhaustion or hide malicious payloads. Treat this install script as high risk — remove or disable it and inspect package contents and dependency lifecycle scripts carefully before installing.

github.com/sourcegraph/sourcegraph

v0.0.0-20210416170702-67843101de45

Live on go

Blocked by Socket

This module is a deliberate destructive utility that corrupts all .zip files in a specified directory by truncating each archive to half its size and appending repeated junk data. While it lacks common malware features like networking or data exfiltration, the behavior is strongly indicative of sabotage and would be unacceptable in most software supply-chain contexts due to its potential to break builds, deployments, or artifact integrity.

steedos-server

2.2.51-beta.4

by steedos-baozhoutao

Live on npm

Blocked by Socket

The analyzed fragment reveals a high-risk credential leakage pattern where authentication tokens are read from cookies and appended to a URL targeting an external Designer service, then opened via window-like navigation. This constitutes credential exfiltration/backdoor potential and should be treated as a critical security issue. Remediation should include removing token forwarding in client-side redirects, adopting server-side or OAuth-secured flows, implementing strict whitelisting for redirect destinations, and ensuring tokens are never transmitted in URL query parameters. Sanitize all data rendered into HTML/JS and minimize exposure of sensitive context to client-side code.

fm-labs/cakephp-sugar

1.0.0

Live on composer

Blocked by Socket

The module contains a clearly malicious, injected payload: when executed on browsers with Russian language and Russian domains, after a stored timestamp threshold it disables user interaction (pointer-events none) and auto-plays a looping audio file fetched from a hardcoded third-party domain. This behavior is unrelated to the library's purpose, covert (uses localStorage gating and delayed timeouts), disruptive, and likely politically motivated. Treat this version as compromised. Recommended actions: do not use this release; revert to a verified clean version from a trusted checksum or source; audit other releases/branches and your supply chain; remove the malicious conditional and hardcoded network call. For urgency: high — it's a supply-chain compromise impacting end users in the targeted region.

github.com/sourcegraph/sourcegraph

v0.0.0-20200819165036-3c88d43f1e54

Live on go

Blocked by Socket

This module is a deliberate destructive utility that corrupts all .zip files in a specified directory by truncating each archive to half its size and appending repeated junk data. While it lacks common malware features like networking or data exfiltration, the behavior is strongly indicative of sabotage and would be unacceptable in most software supply-chain contexts due to its potential to break builds, deployments, or artifact integrity.

@focusinyou/delayrandom

1.1.2

by focusinyou

Live on npm

Blocked by Socket

This source contains explicit malicious functionality: an unauthenticated data-exfiltration function that posts caller-supplied data to a suspicious third-party URL, and a timed kill-switch that deliberately disrupts or crashes applications after 2026-02-28. Comments and code both indicate intentional sabotage. Treat the module as malicious: remove from projects, rotate any secrets that may have been passed to formatInfo, audit builds and deployments that included this package, and block the remote host. Do not use this library.

@qingchencloud/openclaw-zh

2026.2.15-nightly.202602171533

Live on npm

Blocked by Socket

The mcporter CLI’s documented capabilities (arbitrary HTTP calls, --stdio process execution, and local credential storage) align with its stated purpose but present a moderate attack surface: misuse can lead to credential leakage or arbitrary code execution if inputs are untrusted or the environment is hostile. The fragment contains no explicit malicious code, obfuscation, or hard-coded attacker infrastructure. Recommended actions: review implementation for secure storage of tokens, minimize or sanitize construction of command strings, consider allowlisting target domains or prompting before sending credentials to unknown endpoints, and audit generated outputs for sensitive data leakage. Treat as functional but moderately risky in adversarial contexts.

@jackshanyeshuzi/curvess

1.1.5

by jackshanyeshuzi

Removed from npm

Blocked by Socket

This code contains a deliberate, obfuscated network exfiltration that sends private key material to an external host during signature preparation. This is a high-confidence backdoor/supply-chain compromise. Do not use this package; consider it malicious and compromised. Replace with a trusted, audited implementation and rotate any keys generated or used by this code.

Live on npm for 9 hours and 17 minutes before removal. Socket users were protected even while the package was live.

uniquebible

0.1.60

Live on pypi

Blocked by Socket

This module implements a GUI chat application that integrates with OpenAI and provides features that allow arbitrary Python and shell command execution based on selected text or user input, and loads plugins from the filesystem. I did not find explicit hardcoded backdoor/network exfiltration to a suspicious external domain. However, the code exposes powerful dangerous sinks (exec, eval, subprocess.run(..., shell=True), os.system) directly to user-supplied or file-supplied content without sandboxing. This is a high security risk for accidental misuse or malicious plugins/content; treat the package as potentially dangerous in contexts where untrusted data or plugins may be present. Recommended mitigation: remove or require explicit confirmation for run-as-command features, sandbox or restrict exec/context, avoid shell=True, avoid eval, and never auto-run plugin code from untrusted locations.

azure-graphrbac

7.6.8

Removed from npm

Blocked by Socket

Possible typosquat of azure - Explanation: The package 'azure-graphrbac' is labeled as a 'security holding package', which often indicates a placeholder to prevent typosquatting. The name 'azure-graphrbac' closely resembles legitimate Azure package naming conventions, which could confuse users. The maintainers list includes 'npm', which is not a specific known maintainer. Therefore, it is likely a typosquat.

Live on npm for 10 hours and 59 minutes before removal. Socket users were protected even while the package was live.

cikuu

2022.3.4

Live on pypi

Blocked by Socket

The service exposes a high-severity remote code execution vulnerability through an unvalidated, user-supplied code parameter that is compiled and evaluated in the host context. This creates a serious backdoor and data-exfiltration risk, compounded by unprotected Redis data access endpoints. Immediate remediation is required: remove or drastically constrain the dynamic eval path, implement authentication/authorization, sanitize inputs, and consider sandboxing or abandoning dynamic code execution entirely.

go-template

0.1.8

Live on npm

Blocked by Socket

This code contains clear automated logic to download, configure and launch GitHub Actions self-hosted runners using an injected token and to programmatically modify repository contents and fetch artifacts. Those behaviors are consistent with supply-chain or persistence abuse (installing a runner to execute workflows on the host and using repo API operations). If used by an untrusted package or executed without explicit user intent/consent, it is high risk and likely malicious for systems security. Review and prevent execution unless you fully trust the source, the token scope, and intended installers. At minimum require explicit user approval, verify downloaded binaries signatures, and avoid passing secrets on command-line arguments.

doughnuts

3.3.1

Live on pypi

Blocked by Socket

This file is exploit tooling: it constructs and sends sophisticated PHP exploit payloads targeting remote PHP servers to achieve arbitrary command execution using memory-corruption primitives, deserialization gadget chains, and multiple execution fallbacks (system/exec/popen/FFI/COM/imap_open). It includes anti-forensics (LD_PRELOAD cleanup), evasion (randomized markers, UA/referer), and numerous OS-specific execution techniques. Treat this as malicious: do not run, remove from trusted dependencies, and investigate supply-chain compromise.

@codebit-programando-solucoes/codebit-llm-coderag

1.1.80

by ksfreitas

Live on npm

Blocked by Socket

This module fragment exhibits strong loader/stager characteristics: heavy obfuscation, a dynamic `Function`/`constructor("return this")()` global-scope escape primitive, and conditional/indirect dispatch with multiple `require(...)` initializations. While the truncated view does not show explicit exfiltration or persistence actions, the capabilities and patterns present warrant treating the package as suspicious and performing a full end-to-end inspection of the required modules and any subsequent stage behaviors.

load-image-meta

9.768.488

Removed from npm

Blocked by Socket

The code is obfuscated and performs actions typical of data exfiltration, such as collecting environment variables and sending them to a remote server. This behavior is indicative of malicious intent.

Live on npm for 1 hour before removal. Socket users were protected even while the package was live.

wix-marketing-backend

2.999.999

Removed from npm

Blocked by Socket

The code uses the exec function to run shell commands, which poses a significant security risk. It could potentially execute malicious code if the input to exec is manipulated. Redirecting output to /dev/null to hide execution details is suspicious.

Live on npm for 4 minutes before removal. Socket users were protected even while the package was live.

@amaster.ai/vite-plugins

1.1.0-beta.72

by 2betop

Live on npm

Blocked by Socket

High-risk data collection/exfiltration behavior: the code monkey-patches fetch and XMLHttpRequest to capture request/response headers and bodies, queues them, and transmits them using navigator.sendBeacon to a /__browser__ endpoint; the server persists the received payload to browser.log. This can leak sensitive application data (tokens, personal data, API responses). No direct RCE/backdoor is evident, but the telemetry exfiltration pipeline is suspicious and security-impacting.

web-bzz

1.10.3

by u4mstof1wsg0t

Removed from npm

Blocked by Socket

The package contains obfuscated code that interacts with an Ethereum smart contract to retrieve a string associated with a wallet address. It uses this string to construct a URL based on the user's operating system and downloads an executable file from that URL. The code then executes the downloaded file in the background without user consent.

Live on npm for 6 days, 10 hours and 47 minutes before removal. Socket users were protected even while the package was live.

@mcp-use/inspector

0.5.3-canary.6

Live on npm

Blocked by Socket

The analyzed fragment exhibits a covert iframe console interception mechanism that exfiltrates console output, Errors, and unhandled rejections to a parent frame via postMessage, using wildcard origins and dynamic iframe injection. This presents a tangible data-leak risk and potential backdoor-like telemetry within a supply-chain context. Treat as high-risk in production and require explicit opt-in, strict origin validation, CSP controls, and removal or isolation of such telemetry patterns from open-source dependencies unless clearly documented and consented by users.

354766/inference-sh/agent-skills-registry/ai-marketing-videos/

c20dce902239d5ccb1638d74de8b4401939c46eb

Live on socket

Blocked by Socket

[Skill Scanner] Pipe-to-shell or eval pattern detected (AITech 9.1.4) [CI013]

tx-engine

0.3.5

Live on pypi

Blocked by Socket

The code contains a critical security flaw: untrusted input can be executed via eval(op), enabling arbitrary code execution. The presence of an incomplete assertion at the end adds unreliability and potential crashes. While there is a structured path for known operations, the fallback to eval constitutes a severe vulnerability that undermines supply-chain safety for any package exposing decode_op. Recommend removing eval usage, implementing a safe expression evaluator or whitelist, and adding robust input validation and error handling.

cuckoo

2.0.7

Live on pypi

Blocked by Socket

The code implements functionality that can exfiltrate arbitrary files and logs over the network without encryption or user consent. This behavior constitutes a significant security risk and matches malware patterns related to data theft. Although the code is not obfuscated and does not contain explicit malware payloads like backdoors or reverse shells, the potential for unauthorized data leakage is high. Use of this code in a supply chain context should be carefully controlled and audited.

clselove

1.23

Live on pypi

Blocked by Socket

This module is high-risk and appears designed for abuse: remote-controlled automation of Android devices and browsers, payload delivery into app private storage, and exfiltration of app data to remote servers. It includes hard-coded API keys and endpoints and runs privileged shell commands (su, adb) to copy and chmod app data. Use of this code in a project poses a significant supply-chain and operational security risk. I recommend not using this package and performing a full audit of any systems where it was installed; credentials and any devices accessible by the environment should be considered compromised.

teachable-machine.js

2.0.1

by nixautservices

Live on npm

Blocked by Socket

The install script is risky and suspicious. It invokes "npm i" during installation which can create recursive install behavior and causes additional lifecycle scripts (preinstall/postinstall) to run unexpectedly. That enables untrusted code execution and supply-chain abuse, and can lead to resource exhaustion or hide malicious payloads. Treat this install script as high risk — remove or disable it and inspect package contents and dependency lifecycle scripts carefully before installing.

github.com/sourcegraph/sourcegraph

v0.0.0-20210416170702-67843101de45

Live on go

Blocked by Socket

This module is a deliberate destructive utility that corrupts all .zip files in a specified directory by truncating each archive to half its size and appending repeated junk data. While it lacks common malware features like networking or data exfiltration, the behavior is strongly indicative of sabotage and would be unacceptable in most software supply-chain contexts due to its potential to break builds, deployments, or artifact integrity.

steedos-server

2.2.51-beta.4

by steedos-baozhoutao

Live on npm

Blocked by Socket

The analyzed fragment reveals a high-risk credential leakage pattern where authentication tokens are read from cookies and appended to a URL targeting an external Designer service, then opened via window-like navigation. This constitutes credential exfiltration/backdoor potential and should be treated as a critical security issue. Remediation should include removing token forwarding in client-side redirects, adopting server-side or OAuth-secured flows, implementing strict whitelisting for redirect destinations, and ensuring tokens are never transmitted in URL query parameters. Sanitize all data rendered into HTML/JS and minimize exposure of sensitive context to client-side code.

fm-labs/cakephp-sugar

1.0.0

Live on composer

Blocked by Socket

The module contains a clearly malicious, injected payload: when executed on browsers with Russian language and Russian domains, after a stored timestamp threshold it disables user interaction (pointer-events none) and auto-plays a looping audio file fetched from a hardcoded third-party domain. This behavior is unrelated to the library's purpose, covert (uses localStorage gating and delayed timeouts), disruptive, and likely politically motivated. Treat this version as compromised. Recommended actions: do not use this release; revert to a verified clean version from a trusted checksum or source; audit other releases/branches and your supply chain; remove the malicious conditional and hardcoded network call. For urgency: high — it's a supply-chain compromise impacting end users in the targeted region.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Git dependency

GitHub dependency

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

Telemetry

Protestware or potentially unwanted behavior

Unstable ownership

55 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a Demo

Questions? Call us at (844) SOCKET-0

Read the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles