Launch Week Day 5: Introducing Reachability for PHP.Learn More
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.5

We protect you from vulnerable and malicious packages

oci-console-regions

15.0.0

by insecure0x1

Removed from npm

Blocked by Socket

This script is sending sensitive system information to a remote server. This behavior is considered highly suspicious and malicious.

Live on npm for 25 days, 13 hours and 43 minutes before removal. Socket users were protected even while the package was live.

bane

4.5.9

Live on pypi

Blocked by Socket

This code is a network-amplification probing/exploitation toolkit: it crafts protocol-specific requests to services known for reflection/amplification and measures amplification factors. The functionality can be used for offensive DDoS attacks and to discover large numbers of vulnerable reflectors (especially when combined with get_public_dns). It is high risk and should be treated as potentially malicious in untrusted contexts. Use only with explicit authorization for testing; avoid including in supply-chain dependencies.

cue-wasm

1.0.0

by dclareio

Live on npm

Blocked by Socket

This package contains heavily obfuscated code that completely hides its functionality. The extreme level of obfuscation is highly suspicious and typically indicates malicious intent. Cannot determine actual behavior without deobfuscation, but the obfuscation itself represents a significant security risk.

bapy

0.2.216

Live on pypi

Blocked by Socket

The script covertly ensures a background SSH local port-forward to a hard-coded external host as root, clearing any existing ssh on the same local port first. This pattern is consistent with establishing a covert access or exfiltration channel (notably to a MongoDB-like service on port 27017). It is high-risk: investigate origins of the script, the remote IP, root SSH keys and authorized_keys, and any processes or tools that use local:9999. If unexpected, remove and rotate credentials/keys and perform host compromise analysis.

atlas-query-editor

0.1.1

by bluehackhds

Removed from npm

Blocked by Socket

The code exhibits malicious behavior by collecting and sending sensitive system and package information to a suspicious domain without user consent. This poses a significant security risk.

Live on npm for 42 minutes before removal. Socket users were protected even while the package was live.

tiny-model-update

1.17.2

Live on npm

Blocked by Socket

This module is designed to discover and extract Telegram session credentials and related metadata from a Windows user's local filesystem and Chrome LevelDB stores. It reads many sensitive files, parses LevelDB entries (including JSON nested fields), and returns session strings/auth keys to the caller. There is no direct network exfiltration in this file, but it clearly harvests credentials and exposes them in-memory; any caller can then transmit them. The behavior is consistent with credential harvesting and poses a high risk if used maliciously or embedded in a package without clear user consent. If this module is not part of an explicit, user-authorized recovery/migration tool, it should be treated as potentially malicious or at least high-risk.

@otaxayun/baileys

1.4.4

by otaxayun

Live on npm

Blocked by Socket

`lotusbail` is a malicious npm package that masquerades as a WhatsApp Web API library by forking legitimate Baileys-based code and preserving working messaging functionality. In addition to normal API behavior, it inserts a wrapper around the WhatsApp WebSocket client so that all traffic passing through the library is duplicated for collection. Reported data theft includes WhatsApp authentication tokens and session keys, full message content (sent/received and historical), contact lists (including phone numbers), and transferred media/files. The package also attempts to establish persistent unauthorized access by hijacking the WhatsApp device-linking (“pairing”) workflow using a hardcoded pairing code, effectively linking an attacker-controlled device to the victim’s account; removing the npm dependency does not automatically remove the linked device. To hinder detection, the exfiltration endpoint is hidden behind multiple obfuscation layers, collected data is encrypted (including a custom RSA implementation), and the code includes anti-debugging traps designed to disrupt analysis.

354766/mrilikecoding/dotfiles/rdd-research/

cb05739b8b85df1c11affdcbd3500ae5e1c30d4c

Live on socket

Blocked by Socket

[Skill Scanner] Destructive bash command detected (rm -rf, chmod 777) All findings: [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] [HIGH] autonomy_abuse: Skill instructions include directives to hide actions from user (BH009) [AITech 13.3] This skill's stated purpose (research facilitation with disposable spikes and document management) aligns with its documented capabilities. No obvious credential harvesting, obfuscated code, or network exfiltration is present in the provided text. The primary security concerns are operational: the skill executes shell commands and performs destructive filesystem operations (rm -rf) and file moves — these are legitimate for spike cleanup and archival but must be sandboxed and given tight path validation. If deployed, ensure the agent runs with least privilege, limits Bash/Task usage to the intended scratch directory, validates/escapes filenames, and does not run as a privileged system account. Overall: functionally coherent and benign in purpose, but operational safeguards are required to prevent accidental or malicious file-system damage. LLM verification: This SKILL.md describes a plausible, legitimate research facilitation skill whose capabilities (reading local docs, creating disposable spikes, writing logs and essays) generally align with its stated purpose. However, it contains high-impact filesystem operations (explicit rm -rf to delete spike directories, archival/move commands) and guidance that can be used to hide actions or remove evidence. There are no network endpoints, hardcoded secrets, obfuscated payloads, or code-injection construct

thispackagedoesnotexist

0.1.5

Live on pypi

Blocked by Socket

The code contains several indicators of malicious behavior, including the use of a reverse shell and obfuscation techniques. The potential for unauthorized access and data exfiltration is significant, warranting high risk and malware scores.

qg-toolkit

1.1.4

Live on pypi

Blocked by Socket

The script collects sensitive user information from the Discord API, including usernames, emails, and IDs, and saves it to a file without user consent. It automates interactions with Discord, including sending unsolicited messages to channels (spamming), and uses a captcha solving service to bypass security measures. The script contains hardcoded API keys and tokens, posing significant security risks if shared or leaked. Additionally, it includes obfuscated JavaScript code to manipulate local storage tokens, suggesting attempts to hijack or misuse user accounts.

tx-engine

0.6.2

Live on pypi

Blocked by Socket

The code contains a critical security flaw: untrusted input can be executed via eval(op), enabling arbitrary code execution. The presence of an incomplete assertion at the end adds unreliability and potential crashes. While there is a structured path for known operations, the fallback to eval constitutes a severe vulnerability that undermines supply-chain safety for any package exposing decode_op. Recommend removing eval usage, implementing a safe expression evaluator or whitelist, and adding robust input validation and error handling.

exec-sandbox

0.15.1

Live on pypi

Blocked by Socket

This small shell snippet is a high-risk remote code execution primitive: it reads length-prefixed payloads from stdin and executes them with eval, then emits a sentinel with the exit code. The code itself contains no obfuscation or explicit backdoor artifacts, but when stdin is attacker-controlled it enables arbitrary command execution and reliable feedback to the attacker. Do not use this with untrusted input; if required, add strong input validation, authentication, and sandboxing.

pusher-l

1.0.0

Live on pypi

Blocked by Socket

This module is a network-exposed encrypted file transfer service that can read arbitrary server-side files specified by a requester-controlled path and transmit them back over TCP after operator approval. The absence of client authentication and lack of filename/path allowlisting make it highly capable for unauthorized file disclosure and exfiltration. Although it does not show direct stealth/persistence or command execution in this snippet, its behavior aligns strongly with backdoor-like file-read/exfiltration functionality, making it unsuitable for production use without strict access controls, path confinement, and authentication.

ember-cli-3

1.0.0

by getv

Removed from npm

Blocked by Socket

The code exhibits behavior characteristic of malware, specifically targeting data exfiltration and potential command and control activities. The unusual domain name and the type of data collected strongly suggest malicious intent.

Live on npm for 17 hours and 2 minutes before removal. Socket users were protected even while the package was live.

bigdl-orca-spark3

2.4.0b20231108

Live on pypi

Blocked by Socket

The code contains potential security risks such as hard-coded file paths, subprocess.Popen usage, and the handling of untrusted data through PyArrow Plasma. It is essential to review and address these security concerns before using this code in a production environment.

zmicro-design/action-setup-web-terminal

0db657c8f584bfeadfda3ab36627f31227323aae

Live on actions

Blocked by Socket

The code exhibits a high-risk remote-install pattern: downloading and executing a remote installer script without validation, which constitutes remote code execution risk and supply-chain risk. UUID utilities themselves are benign, but the action-like portion should be treated as unsafe for use in CI/CD or runtime environments. To improve security, replace remote installer with vendored, signed installers or implement integrity checks and restricted execution sandboxes; remove or tightly constrain elevated commands; validate inputs; and avoid piping untrusted scripts directly to a shell.

react-pillbox

100.0.0

by m1s0aaaaaaaa

Removed from npm

Blocked by Socket

The code collects sensitive system information including the user's home directory, hostname, username, DNS servers, and package information, and sends this data to an external server at p9ztc9q9o8swj255tukbccr4qvwlka[.]burpcollaborator[.]net without user consent. This behavior constitutes data exfiltration and poses a significant security risk.

Live on npm for 11 days, 22 hours and 16 minutes before removal. Socket users were protected even while the package was live.

bluelamp-ai

1.0.2

Removed from pypi

Blocked by Socket

This file is highly suspicious and poses a significant supply-chain risk. The wrapper intentionally hides executable source and executes it at import-time via exec(), which gives the payload unrestricted access to the running process. Static review cannot determine the payload's actions; treat the package as untrusted until the decompressed code is inspected in a safe, isolated environment. Immediate actions: block use/import, offline-decompress and audit the payload, and if it was executed in production or developer systems follow incident response steps (isolate, collect indicators, scan for network activity and local artifacts, rotate secrets).

Live on pypi for 11 hours and 11 minutes before removal. Socket users were protected even while the package was live.

sap-abstract

0.5.7

by abdallaeg2

Removed from npm

Blocked by Socket

The code is designed to send sensitive system information to a remote server, which is a significant security risk. This behavior is consistent with malicious activity, specifically data exfiltration.

Live on npm for 2 minutes before removal. Socket users were protected even while the package was live.

timtest

0.0.57

by raonwiz

Live on npm

Blocked by Socket

This module behaves like an agent that fingerprints the host (MAC, disk serial, IP, CPU/GPU) and connects to a remote management server, sending a unique machine identifier and IP immediately on connect. The hard-coded external IP/port and inclusion of a 'miner' dependency are strong indicators this is part of a remote-managed mining or botnet framework or otherwise unwanted remote agent. Given the data exfiltration of hardware identifiers and the auto-connect to a remote host, this code should be treated as suspicious and potentially malicious for most application contexts. Further review of tss.js, miner.js, and utils.js is required to confirm full behavior.

json-schema-editor-visual-yapi

6.5.8

by taka14170

Removed from npm

Blocked by Socket

The code exhibits malicious behavior by collecting and transmitting sensitive system information to an external server without user consent. This poses a high security risk and potential for data theft.

Live on npm for 2 hours and 43 minutes before removal. Socket users were protected even while the package was live.

ailever

0.2.829

Live on pypi

Blocked by Socket

The code exhibits a dangerous remote code execution pattern: it downloads and immediately runs a remote Python payload without integrity checks, sandboxing, or input validation. This creates a severe supply-chain and runtime security risk. Recommended mitigations include removing dynamic downloads, validating payloads with cryptographic hashes or signatures, using safe subprocess invocations with argument lists, and implementing strict input sanitization. If remote functionality must remain, switch to a trusted-internal mechanism (e.g., plugin architecture with signed components, offline verification) and add robust error handling and logging.

@augloop/session-protocol

9.3.0

by alexbirsan

Live on npm

Blocked by Socket

The code is malicious and performs covert data exfiltration of system environment information via DNS queries to an attacker-controlled domain. It uses DNS tunneling techniques and evasion mechanisms, representing a high security risk and clear malware behavior.

github.com/weaveworks/weave

v1.0.3-0.20150819092211-0b764a2a2713

Live on go

Blocked by Socket

This module is a high-risk runtime packer/dropper: it embeds an encrypted payload, decrypts it using a user-supplied passphrase, writes the result to `bin/do-setup-circleci-secrets`, and immediately executes it. Because there is no integrity/authenticity validation of the decrypted artifact and the executed code is not shown here, the module should be treated as potentially malicious until the decrypted `bin/do-setup-circleci-secrets` content is inspected and validated in a safe environment.

oci-console-regions

15.0.0

by insecure0x1

Removed from npm

Blocked by Socket

This script is sending sensitive system information to a remote server. This behavior is considered highly suspicious and malicious.

Live on npm for 25 days, 13 hours and 43 minutes before removal. Socket users were protected even while the package was live.

bane

4.5.9

Live on pypi

Blocked by Socket

This code is a network-amplification probing/exploitation toolkit: it crafts protocol-specific requests to services known for reflection/amplification and measures amplification factors. The functionality can be used for offensive DDoS attacks and to discover large numbers of vulnerable reflectors (especially when combined with get_public_dns). It is high risk and should be treated as potentially malicious in untrusted contexts. Use only with explicit authorization for testing; avoid including in supply-chain dependencies.

cue-wasm

1.0.0

by dclareio

Live on npm

Blocked by Socket

This package contains heavily obfuscated code that completely hides its functionality. The extreme level of obfuscation is highly suspicious and typically indicates malicious intent. Cannot determine actual behavior without deobfuscation, but the obfuscation itself represents a significant security risk.

bapy

0.2.216

Live on pypi

Blocked by Socket

The script covertly ensures a background SSH local port-forward to a hard-coded external host as root, clearing any existing ssh on the same local port first. This pattern is consistent with establishing a covert access or exfiltration channel (notably to a MongoDB-like service on port 27017). It is high-risk: investigate origins of the script, the remote IP, root SSH keys and authorized_keys, and any processes or tools that use local:9999. If unexpected, remove and rotate credentials/keys and perform host compromise analysis.

atlas-query-editor

0.1.1

by bluehackhds

Removed from npm

Blocked by Socket

The code exhibits malicious behavior by collecting and sending sensitive system and package information to a suspicious domain without user consent. This poses a significant security risk.

Live on npm for 42 minutes before removal. Socket users were protected even while the package was live.

tiny-model-update

1.17.2

Live on npm

Blocked by Socket

This module is designed to discover and extract Telegram session credentials and related metadata from a Windows user's local filesystem and Chrome LevelDB stores. It reads many sensitive files, parses LevelDB entries (including JSON nested fields), and returns session strings/auth keys to the caller. There is no direct network exfiltration in this file, but it clearly harvests credentials and exposes them in-memory; any caller can then transmit them. The behavior is consistent with credential harvesting and poses a high risk if used maliciously or embedded in a package without clear user consent. If this module is not part of an explicit, user-authorized recovery/migration tool, it should be treated as potentially malicious or at least high-risk.

@otaxayun/baileys

1.4.4

by otaxayun

Live on npm

Blocked by Socket

`lotusbail` is a malicious npm package that masquerades as a WhatsApp Web API library by forking legitimate Baileys-based code and preserving working messaging functionality. In addition to normal API behavior, it inserts a wrapper around the WhatsApp WebSocket client so that all traffic passing through the library is duplicated for collection. Reported data theft includes WhatsApp authentication tokens and session keys, full message content (sent/received and historical), contact lists (including phone numbers), and transferred media/files. The package also attempts to establish persistent unauthorized access by hijacking the WhatsApp device-linking (“pairing”) workflow using a hardcoded pairing code, effectively linking an attacker-controlled device to the victim’s account; removing the npm dependency does not automatically remove the linked device. To hinder detection, the exfiltration endpoint is hidden behind multiple obfuscation layers, collected data is encrypted (including a custom RSA implementation), and the code includes anti-debugging traps designed to disrupt analysis.

354766/mrilikecoding/dotfiles/rdd-research/

cb05739b8b85df1c11affdcbd3500ae5e1c30d4c

Live on socket

Blocked by Socket

[Skill Scanner] Destructive bash command detected (rm -rf, chmod 777) All findings: [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] [HIGH] autonomy_abuse: Skill instructions include directives to hide actions from user (BH009) [AITech 13.3] This skill's stated purpose (research facilitation with disposable spikes and document management) aligns with its documented capabilities. No obvious credential harvesting, obfuscated code, or network exfiltration is present in the provided text. The primary security concerns are operational: the skill executes shell commands and performs destructive filesystem operations (rm -rf) and file moves — these are legitimate for spike cleanup and archival but must be sandboxed and given tight path validation. If deployed, ensure the agent runs with least privilege, limits Bash/Task usage to the intended scratch directory, validates/escapes filenames, and does not run as a privileged system account. Overall: functionally coherent and benign in purpose, but operational safeguards are required to prevent accidental or malicious file-system damage. LLM verification: This SKILL.md describes a plausible, legitimate research facilitation skill whose capabilities (reading local docs, creating disposable spikes, writing logs and essays) generally align with its stated purpose. However, it contains high-impact filesystem operations (explicit rm -rf to delete spike directories, archival/move commands) and guidance that can be used to hide actions or remove evidence. There are no network endpoints, hardcoded secrets, obfuscated payloads, or code-injection construct

thispackagedoesnotexist

0.1.5

Live on pypi

Blocked by Socket

The code contains several indicators of malicious behavior, including the use of a reverse shell and obfuscation techniques. The potential for unauthorized access and data exfiltration is significant, warranting high risk and malware scores.

qg-toolkit

1.1.4

Live on pypi

Blocked by Socket

The script collects sensitive user information from the Discord API, including usernames, emails, and IDs, and saves it to a file without user consent. It automates interactions with Discord, including sending unsolicited messages to channels (spamming), and uses a captcha solving service to bypass security measures. The script contains hardcoded API keys and tokens, posing significant security risks if shared or leaked. Additionally, it includes obfuscated JavaScript code to manipulate local storage tokens, suggesting attempts to hijack or misuse user accounts.

tx-engine

0.6.2

Live on pypi

Blocked by Socket

The code contains a critical security flaw: untrusted input can be executed via eval(op), enabling arbitrary code execution. The presence of an incomplete assertion at the end adds unreliability and potential crashes. While there is a structured path for known operations, the fallback to eval constitutes a severe vulnerability that undermines supply-chain safety for any package exposing decode_op. Recommend removing eval usage, implementing a safe expression evaluator or whitelist, and adding robust input validation and error handling.

exec-sandbox

0.15.1

Live on pypi

Blocked by Socket

This small shell snippet is a high-risk remote code execution primitive: it reads length-prefixed payloads from stdin and executes them with eval, then emits a sentinel with the exit code. The code itself contains no obfuscation or explicit backdoor artifacts, but when stdin is attacker-controlled it enables arbitrary command execution and reliable feedback to the attacker. Do not use this with untrusted input; if required, add strong input validation, authentication, and sandboxing.

pusher-l

1.0.0

Live on pypi

Blocked by Socket

This module is a network-exposed encrypted file transfer service that can read arbitrary server-side files specified by a requester-controlled path and transmit them back over TCP after operator approval. The absence of client authentication and lack of filename/path allowlisting make it highly capable for unauthorized file disclosure and exfiltration. Although it does not show direct stealth/persistence or command execution in this snippet, its behavior aligns strongly with backdoor-like file-read/exfiltration functionality, making it unsuitable for production use without strict access controls, path confinement, and authentication.

ember-cli-3

1.0.0

by getv

Removed from npm

Blocked by Socket

The code exhibits behavior characteristic of malware, specifically targeting data exfiltration and potential command and control activities. The unusual domain name and the type of data collected strongly suggest malicious intent.

Live on npm for 17 hours and 2 minutes before removal. Socket users were protected even while the package was live.

bigdl-orca-spark3

2.4.0b20231108

Live on pypi

Blocked by Socket

The code contains potential security risks such as hard-coded file paths, subprocess.Popen usage, and the handling of untrusted data through PyArrow Plasma. It is essential to review and address these security concerns before using this code in a production environment.

zmicro-design/action-setup-web-terminal

0db657c8f584bfeadfda3ab36627f31227323aae

Live on actions

Blocked by Socket

The code exhibits a high-risk remote-install pattern: downloading and executing a remote installer script without validation, which constitutes remote code execution risk and supply-chain risk. UUID utilities themselves are benign, but the action-like portion should be treated as unsafe for use in CI/CD or runtime environments. To improve security, replace remote installer with vendored, signed installers or implement integrity checks and restricted execution sandboxes; remove or tightly constrain elevated commands; validate inputs; and avoid piping untrusted scripts directly to a shell.

react-pillbox

100.0.0

by m1s0aaaaaaaa

Removed from npm

Blocked by Socket

The code collects sensitive system information including the user's home directory, hostname, username, DNS servers, and package information, and sends this data to an external server at p9ztc9q9o8swj255tukbccr4qvwlka[.]burpcollaborator[.]net without user consent. This behavior constitutes data exfiltration and poses a significant security risk.

Live on npm for 11 days, 22 hours and 16 minutes before removal. Socket users were protected even while the package was live.

bluelamp-ai

1.0.2

Removed from pypi

Blocked by Socket

This file is highly suspicious and poses a significant supply-chain risk. The wrapper intentionally hides executable source and executes it at import-time via exec(), which gives the payload unrestricted access to the running process. Static review cannot determine the payload's actions; treat the package as untrusted until the decompressed code is inspected in a safe, isolated environment. Immediate actions: block use/import, offline-decompress and audit the payload, and if it was executed in production or developer systems follow incident response steps (isolate, collect indicators, scan for network activity and local artifacts, rotate secrets).

Live on pypi for 11 hours and 11 minutes before removal. Socket users were protected even while the package was live.

sap-abstract

0.5.7

by abdallaeg2

Removed from npm

Blocked by Socket

The code is designed to send sensitive system information to a remote server, which is a significant security risk. This behavior is consistent with malicious activity, specifically data exfiltration.

Live on npm for 2 minutes before removal. Socket users were protected even while the package was live.

timtest

0.0.57

by raonwiz

Live on npm

Blocked by Socket

This module behaves like an agent that fingerprints the host (MAC, disk serial, IP, CPU/GPU) and connects to a remote management server, sending a unique machine identifier and IP immediately on connect. The hard-coded external IP/port and inclusion of a 'miner' dependency are strong indicators this is part of a remote-managed mining or botnet framework or otherwise unwanted remote agent. Given the data exfiltration of hardware identifiers and the auto-connect to a remote host, this code should be treated as suspicious and potentially malicious for most application contexts. Further review of tss.js, miner.js, and utils.js is required to confirm full behavior.

json-schema-editor-visual-yapi

6.5.8

by taka14170

Removed from npm

Blocked by Socket

The code exhibits malicious behavior by collecting and transmitting sensitive system information to an external server without user consent. This poses a high security risk and potential for data theft.

Live on npm for 2 hours and 43 minutes before removal. Socket users were protected even while the package was live.

ailever

0.2.829

Live on pypi

Blocked by Socket

The code exhibits a dangerous remote code execution pattern: it downloads and immediately runs a remote Python payload without integrity checks, sandboxing, or input validation. This creates a severe supply-chain and runtime security risk. Recommended mitigations include removing dynamic downloads, validating payloads with cryptographic hashes or signatures, using safe subprocess invocations with argument lists, and implementing strict input sanitization. If remote functionality must remain, switch to a trusted-internal mechanism (e.g., plugin architecture with signed components, offline verification) and add robust error handling and logging.

@augloop/session-protocol

9.3.0

by alexbirsan

Live on npm

Blocked by Socket

The code is malicious and performs covert data exfiltration of system environment information via DNS queries to an attacker-controlled domain. It uses DNS tunneling techniques and evasion mechanisms, representing a high security risk and clear malware behavior.

github.com/weaveworks/weave

v1.0.3-0.20150819092211-0b764a2a2713

Live on go

Blocked by Socket

This module is a high-risk runtime packer/dropper: it embeds an encrypted payload, decrypts it using a user-supplied passphrase, writes the result to `bin/do-setup-circleci-secrets`, and immediately executes it. Because there is no integrity/authenticity validation of the decrypted artifact and the executed code is not shown here, the module should be treated as potentially malicious until the decrypted `bin/do-setup-circleci-secrets` content is inspected and validated in a safe environment.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Git dependency

GitHub dependency

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

Telemetry

Protestware or potentially unwanted behavior

Unstable ownership

55 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a Demo

Questions? Call us at (844) SOCKET-0

Read the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles