Launch Week Day 5: Introducing Reachability for PHP.Learn More
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.5

We protect you from vulnerable and malicious packages

experimental-utils

99.10.9

by wqkkyhkg

Removed from npm

Blocked by Socket

The code is designed to collect and send sensitive information to a remote server without the user's knowledge or consent. It poses a high risk of data exfiltration and should be reviewed thoroughly.

Live on npm for 15 hours and 38 minutes before removal. Socket users were protected even while the package was live.

posting_duo

0.0.33

by zon

Live on rubygems

Blocked by Socket

`posting_duo` markets itself as a Windows-only WordPress bulk-poster, enticing grey-hat marketers who want to blast articles across multiple sites. When launched it opens a Korean-language Glimmer-DSL-LibUI dialog that asks for the target site’s WordPress admin username and password. Immediately after those values are submitted (before any content automation begins) the script silently bundles the plaintext credentials with the host’s MAC address and POSTs the payload to http://appspace[.]kr/bbs/login_check.php, infrastructure controlled by the "zon" threat actor. The MAC address serves as a persistent hardware fingerprint, letting the threat actor correlate victims across separate installations and campaigns. Although the gem proceeds with its promised mass-posting routine, this covert exfiltration turns `posting_duo` into an infostealer: users seeking aggressive WordPress automation instead surrender their own sensitive credentials to the threat actor behind the wider “zon” malware cluster.

sej

0.0.29

by andrewisen

Live on npm

Blocked by Socket

High-risk privacy and likely data-theft behavior. This module fingerprints the browser and explicitly collects document.cookie and localStorage, persists error/history in IndexedDB, and packages both user/environment data (including cookies/storage) and errors/history into a ZIP that is downloaded via saveAs. The use of a hardcoded weak ZIP password further undermines any claimed protection. While the excerpt does not show network exfiltration directly, the downloadable archive creates an effective local-to-outside-system data disclosure channel. Secondary issue: innerHTML usage in the bundled GUI could enable DOM XSS if attacker-controlled strings reach GUI labels.

iefw

3.5.5

by gslks

Live on npm

Blocked by Socket

The code implements a file uploader that sends arbitrary local files to a suspicious external server without user consent or safeguards, posing a significant data exfiltration risk. The default server domain is untrusted, and the code contains implementation errors and lacks error handling. This behavior aligns with malware patterns involving unauthorized data transmission. Therefore, the package should be considered high risk with a high malware probability. No obfuscation is detected.

muaddib-scanner

2.2.17

by dnszlsk

Live on npm

Blocked by Socket

This snippet intentionally obscures and then uses Node's child_process.exec to run a shell command. The immediate command is benign, but the coding pattern (base64-hidden module name, dynamic require, exec on load) is suspicious in a dependency: it grants arbitrary command-execution capability and is commonly used in malicious supply-chain modifications. Treat occurrences of this pattern in third-party packages as high-priority for manual review and provenance checking; if found unexpectedly in a dependency, consider removing or sandboxing until further investigation.

gocept-httpserverlayer

1.0.1

Live on pypi

Blocked by Socket

The code poses significant security risks due to the dynamic execution of external scripts without validation, which could lead to the execution of malicious code. The reliance on external URLs for critical setup processes is a major vulnerability.

clicknium

0.2.4

Live on pypi

Blocked by Socket

This assembly mixes legitimate-sounding IPC and WebSocket messaging with clearly suspicious, high-risk capabilities: strong obfuscation, embedded-resource decryption with a hard-coded AES key/IV, reflection-based runtime code resolution, and native delegates to VirtualAlloc/WriteProcessMemory/OpenProcess/VirtualProtect. Those allow in-memory payload decryption and code injection into other processes. Even though no explicit remote command-and-control domain is present in this fragment, the ability to decrypt and execute hidden payloads and manipulate other processes is typical of malware/backdoor toolkits or advanced installers that hide behavior. I recommend treating this package as high risk: do not run it in production or on sensitive hosts until a full provenance and intent review is completed.

mtmai

0.6.40

Live on pypi

Blocked by Socket

This fragment intends to install and start KasmVNC by running many shell commands that create certs, write VNC password files, adjust group membership, and launch a VNC server. The primary security issues are unsafe shell interpolation (command injection risk), programmatic persistence of a possibly predictable password, execution with sudo based on unvalidated env vars, starting a VNC server exposed on 0.0.0.0 with disabled/basic auth, and multiple unsafe filesystem operations performed via shell. There is no clear evidence of obfuscated or direct exfiltration malware, but the behavior can provide an unauthorized remote access vector (backdoor-like) if used maliciously. Do not run this code without fixing shell usage, validating inputs, using secure randomly generated passwords, enforcing proper file permissions, and not disabling authentication.

agentdojo

0.1.8

Live on pypi

Blocked by Socket

The code/log shows a successful prompt-injection and subsequent data exfiltration: tool/webpage output contained malicious instructions to post channel messages (including a secret) to an external site, and the assistant followed them, posting sensitive data to http://www.my-website-234.com/random. This is a clear supply-chain / prompt-injection attack pattern and resulted in unauthorized data exfiltration. Recommend treating the external webpage and the receiving domain as malicious, removing trust in tool outputs, enforcing strict delimiter/guardrail handling, and preventing automatic side-effectful actions based solely on untrusted content.

github.com/XiaomingX/data-cve-poc

v0.0.0-20250123002740-ed79d10af151

Live on go

Blocked by Socket

This module is highly indicative of malicious/weaponized vulnerability scanning/exploitation tooling. It (a) disables TLS verification, (b) uses an out-of-band callback service (dnslog.cn) with a hardcoded cookie, (c) injects an explicit command-substitution-style payload into a target URL parameter targeting /fog/management/export.php, and (d) verifies success by polling dnslog.cn records and printing a CVE/RCE “discovered” message. Despite a likely runtime defect in the provided snippet (incomplete data variable), the overall workflow, sinks, and payload construction strongly support a security alert. Treat as unsafe for supply-chain inclusion and investigate/contain.

gnach

5.2.3

by viktoria115

Removed from npm

Blocked by Socket

The primary security risk is the unsafe use of eval on dynamically parsed content from a file that could be modified by an attacker, leading to arbitrary code execution. No direct malware or obfuscation is detected, but the eval usage represents a high security risk. The LICENSE file should never be treated as executable code without strict validation. The existing reports are inadequate and should be replaced with detailed analysis like this.

Live on npm for 7 days, 18 hours and 34 minutes before removal. Socket users were protected even while the package was live.

nolimit-x

1.0.103

by nolimitaworkspace

Live on npm

Blocked by Socket

This module is highly suspicious and likely offensive. It performs DNS reconnaissance of DKIM-like records for attacker-controlled domains, parses cryptographic/signing parameters, evaluates exploitability, and generates attacker-oriented 'command'/'payload' strings (including key-material filename references). It also imports child_process.exec/execAsync, enabling execution of those commands elsewhere in the full codebase. While the exact exec invocation and any exfiltration behavior are not shown in the provided fragment, the intent and operational outputs strongly indicate malicious functionality.

fsd

0.0.661

Removed from pypi

Blocked by Socket

The module contains high-risk operations: executing arbitrary shell commands via subprocess with shell=True and writing/appending to files without validation. If the steps JSON or the user input is untrusted, an attacker can achieve remote code execution, modify arbitrary files, and change process state (cwd). There are no signs of network exfiltration or hardcoded credentials in this fragment, but the command execution sink is sufficient to escalate to any of those behaviors if exploited. Recommendation: treat inputs (steps, file names, user-provided suggested commands) as untrusted; remove shell=True or use argument lists, validate and canonicalize file paths, avoid executing suggested commands automatically, and employ strict prompting and auditing. Overall this code is not itself evidently obfuscated or explicitly malicious, but it poses a significant supply-chain/runtime risk when given untrusted instructions.

Live on pypi for 5 days, 5 hours and 50 minutes before removal. Socket users were protected even while the package was live.

harperdb

2.1.1

by harperdb_team

Live on npm

Blocked by Socket

This postinstall step runs an opaque compiled script via bytenode during installation. Because the .jsc bytecode cannot be audited and is executed automatically from node_modules, this is a high risk for untrusted code execution and possible malicious behavior (data exfiltration, telemetry, reverse shells, or system damage). Combined with the duplicated/bundled dependency listings (per the stated critical rules) and an older Node engine requirement, I assess this as likely malicious or at least unsafe to run without manual review of the compiled payload and provenance of the bytenode package and the bundled files.

ncx-js

1.2.1

by k4dirr

Removed from npm

Blocked by Socket

The code is potentially dangerous due to the use of 'exec' with unsanitized input, leading to a command injection vulnerability. The use of global hooks is suspicious and could be exploited for malicious purposes. While there is no direct evidence of malicious behavior, the unusual use of global hooks and the lack of input validation present significant security risks.

Live on npm for 14 days, 11 hours and 37 minutes before removal. Socket users were protected even while the package was live.

pytdx

1.55

Live on pypi

Blocked by Socket

This code retrieves a DLL from hxxp://example[.]com/tts/Trade.dll and a ZIP file from hxxp://example[.]com/tts/TdxTradeServer-0.1_20170823174759.zip, modifies the DLL with user-provided credentials, and sets up a server environment. The absence of file integrity or signature checks significantly increases the risk of executing malicious code. Embedding user account details in the DLL also raises privacy concerns. Reliance on potentially unsafe external URLs for core functionality further escalates the threat potential.

external-nuker

1.0.5

by slayerm7

Live on npm

Blocked by Socket

This module is a loader for a Discord 'nuker' tool. It handles sensitive Discord tokens (retrieval, persistence, and use for programmatic login) and transitions to application logic that is likely designed to perform destructive actions. While this specific file does not explicitly exfiltrate data or call out to external C2 domains, the overall capability to persist and login with tokens combined with explicit 'nuker' naming demonstrates malicious intent and high risk. Recommend blocking/removing this package from trusted supply chains, preventing execution with real credentials, and treating it as malicious.

github-badge-bot

1.3.5

Live on npm

Blocked by Socket

The code logs into Discord accounts using provided tokens, enumerates guilds, obtains or creates persistent invite links, and sends those links to an external Telegram endpoint. This is a privacy-invasive behavior that can be used to exfiltrate server invite links and server names. The code is readable and not obfuscated, but its behavior is consistent with abusive or malicious use (harvesting and sharing guild invites). Recommend treating this module as high risk for misuse; inspect sendInviteToTelegram implementation and validate intent/consent before use. If tokens are not owned/authorized, do not run this code.

carbonorm/carbonphp

13.4.5

Live on composer

Blocked by Socket

The dominant security concern is the explicit use of eval on data-derived JSON within CarbonPHP.handlebars, which can enable arbitrary code execution if data is attacker-controlled. Additional concerns include unsanitized dynamic script/template loading and a busy-wait sleep that can degrade performance and potentially expose timing information. Overall risk is high due to the eval pattern and dynamic content loading without strong sanitization.

mtmai

0.3.1098

Live on pypi

Blocked by Socket

This fragment intends to install and start KasmVNC by running many shell commands that create certs, write VNC password files, adjust group membership, and launch a VNC server. The primary security issues are unsafe shell interpolation (command injection risk), programmatic persistence of a possibly predictable password, execution with sudo based on unvalidated env vars, starting a VNC server exposed on 0.0.0.0 with disabled/basic auth, and multiple unsafe filesystem operations performed via shell. There is no clear evidence of obfuscated or direct exfiltration malware, but the behavior can provide an unauthorized remote access vector (backdoor-like) if used maliciously. Do not run this code without fixing shell usage, validating inputs, using secure randomly generated passwords, enforcing proper file permissions, and not disabling authentication.

experimental-utils

99.10.9

by wqkkyhkg

Removed from npm

Blocked by Socket

The code is designed to collect and send sensitive information to a remote server without the user's knowledge or consent. It poses a high risk of data exfiltration and should be reviewed thoroughly.

Live on npm for 15 hours and 38 minutes before removal. Socket users were protected even while the package was live.

posting_duo

0.0.33

by zon

Live on rubygems

Blocked by Socket

`posting_duo` markets itself as a Windows-only WordPress bulk-poster, enticing grey-hat marketers who want to blast articles across multiple sites. When launched it opens a Korean-language Glimmer-DSL-LibUI dialog that asks for the target site’s WordPress admin username and password. Immediately after those values are submitted (before any content automation begins) the script silently bundles the plaintext credentials with the host’s MAC address and POSTs the payload to http://appspace[.]kr/bbs/login_check.php, infrastructure controlled by the "zon" threat actor. The MAC address serves as a persistent hardware fingerprint, letting the threat actor correlate victims across separate installations and campaigns. Although the gem proceeds with its promised mass-posting routine, this covert exfiltration turns `posting_duo` into an infostealer: users seeking aggressive WordPress automation instead surrender their own sensitive credentials to the threat actor behind the wider “zon” malware cluster.

sej

0.0.29

by andrewisen

Live on npm

Blocked by Socket

High-risk privacy and likely data-theft behavior. This module fingerprints the browser and explicitly collects document.cookie and localStorage, persists error/history in IndexedDB, and packages both user/environment data (including cookies/storage) and errors/history into a ZIP that is downloaded via saveAs. The use of a hardcoded weak ZIP password further undermines any claimed protection. While the excerpt does not show network exfiltration directly, the downloadable archive creates an effective local-to-outside-system data disclosure channel. Secondary issue: innerHTML usage in the bundled GUI could enable DOM XSS if attacker-controlled strings reach GUI labels.

iefw

3.5.5

by gslks

Live on npm

Blocked by Socket

The code implements a file uploader that sends arbitrary local files to a suspicious external server without user consent or safeguards, posing a significant data exfiltration risk. The default server domain is untrusted, and the code contains implementation errors and lacks error handling. This behavior aligns with malware patterns involving unauthorized data transmission. Therefore, the package should be considered high risk with a high malware probability. No obfuscation is detected.

muaddib-scanner

2.2.17

by dnszlsk

Live on npm

Blocked by Socket

This snippet intentionally obscures and then uses Node's child_process.exec to run a shell command. The immediate command is benign, but the coding pattern (base64-hidden module name, dynamic require, exec on load) is suspicious in a dependency: it grants arbitrary command-execution capability and is commonly used in malicious supply-chain modifications. Treat occurrences of this pattern in third-party packages as high-priority for manual review and provenance checking; if found unexpectedly in a dependency, consider removing or sandboxing until further investigation.

gocept-httpserverlayer

1.0.1

Live on pypi

Blocked by Socket

The code poses significant security risks due to the dynamic execution of external scripts without validation, which could lead to the execution of malicious code. The reliance on external URLs for critical setup processes is a major vulnerability.

clicknium

0.2.4

Live on pypi

Blocked by Socket

This assembly mixes legitimate-sounding IPC and WebSocket messaging with clearly suspicious, high-risk capabilities: strong obfuscation, embedded-resource decryption with a hard-coded AES key/IV, reflection-based runtime code resolution, and native delegates to VirtualAlloc/WriteProcessMemory/OpenProcess/VirtualProtect. Those allow in-memory payload decryption and code injection into other processes. Even though no explicit remote command-and-control domain is present in this fragment, the ability to decrypt and execute hidden payloads and manipulate other processes is typical of malware/backdoor toolkits or advanced installers that hide behavior. I recommend treating this package as high risk: do not run it in production or on sensitive hosts until a full provenance and intent review is completed.

mtmai

0.6.40

Live on pypi

Blocked by Socket

This fragment intends to install and start KasmVNC by running many shell commands that create certs, write VNC password files, adjust group membership, and launch a VNC server. The primary security issues are unsafe shell interpolation (command injection risk), programmatic persistence of a possibly predictable password, execution with sudo based on unvalidated env vars, starting a VNC server exposed on 0.0.0.0 with disabled/basic auth, and multiple unsafe filesystem operations performed via shell. There is no clear evidence of obfuscated or direct exfiltration malware, but the behavior can provide an unauthorized remote access vector (backdoor-like) if used maliciously. Do not run this code without fixing shell usage, validating inputs, using secure randomly generated passwords, enforcing proper file permissions, and not disabling authentication.

agentdojo

0.1.8

Live on pypi

Blocked by Socket

The code/log shows a successful prompt-injection and subsequent data exfiltration: tool/webpage output contained malicious instructions to post channel messages (including a secret) to an external site, and the assistant followed them, posting sensitive data to http://www.my-website-234.com/random. This is a clear supply-chain / prompt-injection attack pattern and resulted in unauthorized data exfiltration. Recommend treating the external webpage and the receiving domain as malicious, removing trust in tool outputs, enforcing strict delimiter/guardrail handling, and preventing automatic side-effectful actions based solely on untrusted content.

github.com/XiaomingX/data-cve-poc

v0.0.0-20250123002740-ed79d10af151

Live on go

Blocked by Socket

This module is highly indicative of malicious/weaponized vulnerability scanning/exploitation tooling. It (a) disables TLS verification, (b) uses an out-of-band callback service (dnslog.cn) with a hardcoded cookie, (c) injects an explicit command-substitution-style payload into a target URL parameter targeting /fog/management/export.php, and (d) verifies success by polling dnslog.cn records and printing a CVE/RCE “discovered” message. Despite a likely runtime defect in the provided snippet (incomplete data variable), the overall workflow, sinks, and payload construction strongly support a security alert. Treat as unsafe for supply-chain inclusion and investigate/contain.

gnach

5.2.3

by viktoria115

Removed from npm

Blocked by Socket

The primary security risk is the unsafe use of eval on dynamically parsed content from a file that could be modified by an attacker, leading to arbitrary code execution. No direct malware or obfuscation is detected, but the eval usage represents a high security risk. The LICENSE file should never be treated as executable code without strict validation. The existing reports are inadequate and should be replaced with detailed analysis like this.

Live on npm for 7 days, 18 hours and 34 minutes before removal. Socket users were protected even while the package was live.

nolimit-x

1.0.103

by nolimitaworkspace

Live on npm

Blocked by Socket

This module is highly suspicious and likely offensive. It performs DNS reconnaissance of DKIM-like records for attacker-controlled domains, parses cryptographic/signing parameters, evaluates exploitability, and generates attacker-oriented 'command'/'payload' strings (including key-material filename references). It also imports child_process.exec/execAsync, enabling execution of those commands elsewhere in the full codebase. While the exact exec invocation and any exfiltration behavior are not shown in the provided fragment, the intent and operational outputs strongly indicate malicious functionality.

fsd

0.0.661

Removed from pypi

Blocked by Socket

The module contains high-risk operations: executing arbitrary shell commands via subprocess with shell=True and writing/appending to files without validation. If the steps JSON or the user input is untrusted, an attacker can achieve remote code execution, modify arbitrary files, and change process state (cwd). There are no signs of network exfiltration or hardcoded credentials in this fragment, but the command execution sink is sufficient to escalate to any of those behaviors if exploited. Recommendation: treat inputs (steps, file names, user-provided suggested commands) as untrusted; remove shell=True or use argument lists, validate and canonicalize file paths, avoid executing suggested commands automatically, and employ strict prompting and auditing. Overall this code is not itself evidently obfuscated or explicitly malicious, but it poses a significant supply-chain/runtime risk when given untrusted instructions.

Live on pypi for 5 days, 5 hours and 50 minutes before removal. Socket users were protected even while the package was live.

harperdb

2.1.1

by harperdb_team

Live on npm

Blocked by Socket

This postinstall step runs an opaque compiled script via bytenode during installation. Because the .jsc bytecode cannot be audited and is executed automatically from node_modules, this is a high risk for untrusted code execution and possible malicious behavior (data exfiltration, telemetry, reverse shells, or system damage). Combined with the duplicated/bundled dependency listings (per the stated critical rules) and an older Node engine requirement, I assess this as likely malicious or at least unsafe to run without manual review of the compiled payload and provenance of the bytenode package and the bundled files.

ncx-js

1.2.1

by k4dirr

Removed from npm

Blocked by Socket

The code is potentially dangerous due to the use of 'exec' with unsanitized input, leading to a command injection vulnerability. The use of global hooks is suspicious and could be exploited for malicious purposes. While there is no direct evidence of malicious behavior, the unusual use of global hooks and the lack of input validation present significant security risks.

Live on npm for 14 days, 11 hours and 37 minutes before removal. Socket users were protected even while the package was live.

pytdx

1.55

Live on pypi

Blocked by Socket

This code retrieves a DLL from hxxp://example[.]com/tts/Trade.dll and a ZIP file from hxxp://example[.]com/tts/TdxTradeServer-0.1_20170823174759.zip, modifies the DLL with user-provided credentials, and sets up a server environment. The absence of file integrity or signature checks significantly increases the risk of executing malicious code. Embedding user account details in the DLL also raises privacy concerns. Reliance on potentially unsafe external URLs for core functionality further escalates the threat potential.

external-nuker

1.0.5

by slayerm7

Live on npm

Blocked by Socket

This module is a loader for a Discord 'nuker' tool. It handles sensitive Discord tokens (retrieval, persistence, and use for programmatic login) and transitions to application logic that is likely designed to perform destructive actions. While this specific file does not explicitly exfiltrate data or call out to external C2 domains, the overall capability to persist and login with tokens combined with explicit 'nuker' naming demonstrates malicious intent and high risk. Recommend blocking/removing this package from trusted supply chains, preventing execution with real credentials, and treating it as malicious.

github-badge-bot

1.3.5

Live on npm

Blocked by Socket

The code logs into Discord accounts using provided tokens, enumerates guilds, obtains or creates persistent invite links, and sends those links to an external Telegram endpoint. This is a privacy-invasive behavior that can be used to exfiltrate server invite links and server names. The code is readable and not obfuscated, but its behavior is consistent with abusive or malicious use (harvesting and sharing guild invites). Recommend treating this module as high risk for misuse; inspect sendInviteToTelegram implementation and validate intent/consent before use. If tokens are not owned/authorized, do not run this code.

carbonorm/carbonphp

13.4.5

Live on composer

Blocked by Socket

The dominant security concern is the explicit use of eval on data-derived JSON within CarbonPHP.handlebars, which can enable arbitrary code execution if data is attacker-controlled. Additional concerns include unsanitized dynamic script/template loading and a busy-wait sleep that can degrade performance and potentially expose timing information. Overall risk is high due to the eval pattern and dynamic content loading without strong sanitization.

mtmai

0.3.1098

Live on pypi

Blocked by Socket

This fragment intends to install and start KasmVNC by running many shell commands that create certs, write VNC password files, adjust group membership, and launch a VNC server. The primary security issues are unsafe shell interpolation (command injection risk), programmatic persistence of a possibly predictable password, execution with sudo based on unvalidated env vars, starting a VNC server exposed on 0.0.0.0 with disabled/basic auth, and multiple unsafe filesystem operations performed via shell. There is no clear evidence of obfuscated or direct exfiltration malware, but the behavior can provide an unauthorized remote access vector (backdoor-like) if used maliciously. Do not run this code without fixing shell usage, validating inputs, using secure randomly generated passwords, enforcing proper file permissions, and not disabling authentication.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Git dependency

GitHub dependency

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

Telemetry

Protestware or potentially unwanted behavior

Unstable ownership

55 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a Demo

Questions? Call us at (844) SOCKET-0

Read the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles