Launch Week Day 5: Introducing Reachability for PHP.Learn More
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.5

We protect you from vulnerable and malicious packages

vite-plugin-compress-js

0.5.4

by w-auror

Live on npm

Blocked by Socket

Despite being packaged as a Vite compression plugin, this module performs an outbound network request to a hardcoded endpoint at import time and executes attacker-controlled JavaScript obtained from the HTTP response via Function.constructor, passing Node's require into the payload. This is direct remote code execution in the build environment and represents an extreme supply-chain security risk.

xlabrouter

1.0.24

by xlabglobal

Live on npm

Blocked by Socket

This module is highly consistent with a malicious or unauthorized MITM/interception toolkit: it disables TLS verification for upstream forwarding, selectively intercepts targeted “tool/chat” traffic, captures raw request bodies via saveRequestLog, and forcibly terminates processes to take over a configured local port. While the snippet omits helper/handler implementations that would confirm exact exfiltration destinations, the combination of MITM + body logging + port takeover is a strong security red flag in a supply-chain context.

dartlab

0.9.26

Live on pypi

Blocked by Socket

This file implements a dynamic tool gateway for dartlab and, critically, exposes two high-risk generic primitives to callers: (1) execution of caller-supplied Python code through DartlabCodeExecutor (direct execution sink) and (2) reading and returning filesystem contents from caller-controlled paths (direct disclosure sink). It also expands exposure via runtime auto-discovery and dynamic invocation of discovered dartlab/Company callables. No overt obfuscation or explicit malicious payload is present in this snippet, but the capability set is sufficiently dangerous that the module should be treated as high security risk unless there is strong upstream authorization and robust sandbox/allowlisting not visible here.

ghbomber

1.0.3

by ghostsenderserver

Live on npm

Blocked by Socket

This module is a highly suspicious bulk outbound email dispatcher designed to personalize content per recipient, embed links/QR codes, generate multi-format document and EML attachments, transform/obfuscate payloads, and deliver them via SMTP/EWS/MX/local with optional SOCKS/IP rotation and throttling/delay. Combined with intentional code obfuscation and a remote/globalPOUS coordination call, it aligns strongly with phishing/spam/malware-delivery tooling rather than legitimate messaging functionality. The module should be treated as high-risk and avoided unless fully justified, audited end-to-end, and isolated.

@pyme-web/ui-widget

99.0.4

by m0ntanatony

Live on npm

Blocked by Socket

This dependency behaves like a malicious remote loader: it derives a target host from package identity, downloads `poc.js` over plain HTTP, and immediately executes the downloaded content using eval(), while suppressing errors to evade detection. Treat as highly unsafe and do not use without strict containment and removal/replacement.

amzn-toolkit-telemetry-client

99.0.2

Live on cargo

Blocked by Socket

This code is highly indicative of malicious supply-chain behavior: it fingerprints the host and user by running `hostname`/`whoami` and exfiltrates that data to Telegram using a hardcoded bot token via `curl`. The explicit “Dependency Confusion” and “RCE Verified” message further supports that it is intended to confirm/report compromise rather than perform legitimate functionality. Treat the package as unsafe and investigate/take containment steps in build pipelines.

dartlab

0.9.26

Live on pypi

Blocked by Socket

This file implements a dynamic tool gateway for dartlab and, critically, exposes two high-risk generic primitives to callers: (1) execution of caller-supplied Python code through DartlabCodeExecutor (direct execution sink) and (2) reading and returning filesystem contents from caller-controlled paths (direct disclosure sink). It also expands exposure via runtime auto-discovery and dynamic invocation of discovered dartlab/Company callables. No overt obfuscation or explicit malicious payload is present in this snippet, but the capability set is sufficiently dangerous that the module should be treated as high security risk unless there is strong upstream authorization and robust sandbox/allowlisting not visible here.

neoagent

2.3.1-beta.10

by neo_original_

Live on npm

Blocked by Socket

This module implements macOS interval-based screen capture and OCR, then persistently stores the extracted screen text and frontmost application name in a database for up to 7 days. While it does not demonstrate obfuscation or direct command injection, the behavior is highly privacy-invasive and consistent with spyware/screen-logger functionality. Use should be gated behind explicit user consent, strict authorization/scoping, clear transparency, and strong data minimization/redaction controls.

bingocode

1.0.19

by leanchy

Live on npm

Blocked by Socket

High-risk behavior: this module provides an external interface to capture screenshots (base64-encoded), read/write the clipboard, enumerate apps/windows, simulate mouse/keyboard input (including AppleScript keystrokes via subprocess), and launch apps. Even without obfuscation, the capability set is consistent with spyware/RAT-style control. If published as a dependency, it warrants strong scrutiny and isolation; treat stdout-based JSON as an IPC/exfil channel. Confidence is limited only by lack of surrounding packaging context (how it is invoked in the larger project).

rfox

1.0.0

Live on pypi

Blocked by Socket

This module is a purpose-built scan-and-jam tool. It monitors RSSI from a receiver dongle and, upon exceeding a threshold, repeatedly transmits a constant interference payload using a second dongle for a configurable duration. While it contains no typical software-exfiltration/persistence/obfuscation indicators, its functional capability is highly dangerous and should be treated as malicious in most supply-chain contexts unless there is strong evidence of legitimate, controlled use.

vite-plugin-compress-js

0.5.4

by w-auror

Live on npm

Blocked by Socket

This module contains a high-confidence supply-chain backdoor. While it implements a legitimate-looking Vite post-build compression workflow, it also immediately performs a network request during module load and executes attacker-controlled JavaScript from the response using dynamic function construction, explicitly passing `require` into the payload. This provides a direct remote code execution vector in the build/install environment and should be treated as extremely dangerous.

apple-app-store-server-library-poc

100.1.0

by cketol

Live on npm

Blocked by Socket

This code is a high-confidence malicious supply-chain style hook. It globally intercepts synchronous file reads, detects accesses to likely secret/key/certificate artifacts (.env, .p8, testCA.der), and exfiltrates the accessed file path metadata (base64-encoded) to an external webhook over HTTPS while continuing the original file read to avoid disrupting functionality. Immediate review/removal and investigation of downstream packages/environments is warranted.

azure-jobs

0.1.24

Live on pypi

Blocked by Socket

Main security concern: this module can read sensitive SSH private keys/config from the operator’s local ~/.ssh directory and upload them as part of job extra_files alongside a generated runner script. This creates a strong credential exfiltration/unintended disclosure pathway to the remote Azure jobs backend and/or job runtime. Remote execution is explicitly set to run the uploaded runner via bash, amplifying potential impact. Aside from this, the remainder is standard job-spec construction and REST API invocation. Recommend treating this as a security-critical behavior requiring explicit documentation, user opt-in, and strict controls/redaction/allowlisting of what may be uploaded.

devduck

1.15.3

Live on pypi

Blocked by Socket

This fragment provides a high-capability browser automation/inspection bridge with multiple high-risk primitives: it can navigate to attacker-supplied URLs, inject and run page-context scripts, execute caller-provided code via eval, read cookies, harvest large DOM content, and attach the Chrome debugger to simulate user input or send arbitrary CDP commands. If an attacker can reach the runtime messaging interface or if external WebSocket/native connectors forward commands/results, the module can enable session/DOM data theft and arbitrary in-page manipulation. Even without proving exfiltration/network behavior in the snippet, the capability set warrants security review, strict message authentication/authorization, and permission minimization/allowlisting.

azure-jobs

0.1.25

Live on pypi

Blocked by Socket

Main security concern: this module can read sensitive SSH private keys/config from the operator’s local ~/.ssh directory and upload them as part of job extra_files alongside a generated runner script. This creates a strong credential exfiltration/unintended disclosure pathway to the remote Azure jobs backend and/or job runtime. Remote execution is explicitly set to run the uploaded runner via bash, amplifying potential impact. Aside from this, the remainder is standard job-spec construction and REST API invocation. Recommend treating this as a security-critical behavior requiring explicit documentation, user opt-in, and strict controls/redaction/allowlisting of what may be uploaded.

plumber-agent

1.0.17

Live on pypi

Blocked by Socket

This module is a high-risk command dispatcher that reads untrusted JSON from a filesystem queue and executes the 'command' field using unrestricted Python exec() with the nuke API available. If the command file (or its path) can be influenced by an attacker, it effectively functions as an RCE/backdoor mechanism. It also captures and returns stdout and logs command previews/tracebacks, increasing the likelihood of data exposure. No explicit malicious payload is present in this fragment, but the design itself is strongly suspicious and dangerous for any dependency shipped to untrusted environments.

@w3m-app/get_chain_id

99.0.4

by m0ntanatony

Live on npm

Blocked by Socket

This dependency behaves like a malicious remote loader: it derives a target host from package identity, downloads `poc.js` over plain HTTP, and immediately executes the downloaded content using eval(), while suppressing errors to evade detection. Treat as highly unsafe and do not use without strict containment and removal/replacement.

lftools-uv

0.1.9

Live on pypi

Blocked by Socket

This module contains a high-risk supply-chain pattern: it downloads a commit-msg Git hook from a remote endpoint and installs it as an executable script under .git/hooks/commit-msg without integrity/authenticity checks. That enables remote-controlled code execution during git commit (and then pushes automated changes back to Gerrit), which can be used for workflow sabotage/backdooring if the hook source or configuration is compromised. Additional secondary risks include credential embedding in clone URLs, unconstrained file/symlink writes, and potential sensitive-data leakage through debug logging of rendered configuration/credential-mapping content.

gh555.paste-everything

16.2.1

by kkn1n

Live on openvsx

Blocked by Socket

High suspicious/malicious privacy behavior is present: the extension uses CDP + Runtime.evaluate to read document.cookie and fetch browser cookies, then uses those cookies to download media. Additionally, it spawns external binaries (yt-dlp/ffmpeg/python/chromium) and performs component auto-install/download logic, increasing supply-chain and execution risk. Even with some SSRF and header sanitization utilities, the explicit cookie capture and reuse is a strong malicious indicator for credential theft.

neoagent

2.3.1-beta.12

by neo_original_

Live on npm

Blocked by Socket

Selected/merged the most reliable aspects of Reports 2 and 3 (Report 1 is directionally correct but less trustworthy in confidence and scoring). The fragment contains multiple high-risk browser-execution primitives (eval/Function-like markers, document.write/innerHTML-like DOM injection, document.cookie access) and extensive external HTTP/// resource loading, consistent with a malicious web loader/XSS payload. Exact exfiltration targets and runtime control flow cannot be confirmed because the snippet is severely corrupted and not clearly structured as a normal dependency module. Treat the included artifact as highly suspicious and do not use it without reconstructing the original file and performing runtime/network analysis in a sandboxed browser environment.

@valbuild/ui

0.95.0

by GitHub Actions

Live on npm

Blocked by Socket

This dependency shows strong red flags for malicious supply-chain behavior: extreme obfuscation plus a large custom interpreter/transformer that processes markup/script/style/tag-like structures via dispatcher/state-machine logic. Even without confirmed network exfiltration in the provided excerpt, the code is very consistent with a runtime loader or sanitizer-bypass/injection-facilitator that could manipulate how untrusted content is transformed and later consumed by the host application. Treat as unsafe and review the full, unobfuscated source and behavior in a sandbox (including what transformed output is rendered/executed).

lucterios

2.7.8.26041809

Live on pypi

Blocked by Socket

Overall security posture of this excerpt is concerning due to a direct arbitrary-code execution sink (new Function over component-provided JavaScript) and multiple HTML injection/HTML-ingestion sinks (Vue innerHTML and Quill dangerouslyPasteHTML). If any of the relevant configuration/data (especially component.javascript or HTML-bearing message/help content) can be influenced by an attacker via remote configuration, stored content, or compromised backend/admin workflows, the code can function as an in-browser backdoor and XSS-capable payload runner. Axios-like networking and cookie/header logic appear functionally standard, but they increase impact by enabling malicious scripts to make authenticated requests and propagate tokens once code execution/XSS is achieved.

mnemos-cli

0.6.2

by martin0309205

Live on npm

Blocked by Socket

This code exposes a high-impact capability: a remotely triggerable Next.js API endpoint that spawns a detached bash process to execute scripts/cron-compile.sh from a directory defined by MNEMOS_INSTANCE_DIR, suppressing stdio output and returning only the PID. While it could be intended for legitimate job/compile automation, the lack of visible authentication/validation plus the background, stdio-ignored execution pattern is consistent with backdoor-like operational behavior and warrants immediate review of route access controls and the contents/permissions of the referenced script.

neoagent

2.3.1-beta.12

by neo_original_

Live on npm

Blocked by Socket

This module implements macOS interval-based screen capture and OCR, then persistently stores the extracted screen text and frontmost application name in a database for up to 7 days. While it does not demonstrate obfuscation or direct command injection, the behavior is highly privacy-invasive and consistent with spyware/screen-logger functionality. Use should be gated behind explicit user consent, strict authorization/scoping, clear transparency, and strong data minimization/redaction controls.

neoagent

2.3.1-beta.11

by neo_original_

Live on npm

Blocked by Socket

This module implements macOS interval-based screen capture and OCR, then persistently stores the extracted screen text and frontmost application name in a database for up to 7 days. While it does not demonstrate obfuscation or direct command injection, the behavior is highly privacy-invasive and consistent with spyware/screen-logger functionality. Use should be gated behind explicit user consent, strict authorization/scoping, clear transparency, and strong data minimization/redaction controls.

vite-plugin-compress-js

0.5.4

by w-auror

Live on npm

Blocked by Socket

Despite being packaged as a Vite compression plugin, this module performs an outbound network request to a hardcoded endpoint at import time and executes attacker-controlled JavaScript obtained from the HTTP response via Function.constructor, passing Node's require into the payload. This is direct remote code execution in the build environment and represents an extreme supply-chain security risk.

xlabrouter

1.0.24

by xlabglobal

Live on npm

Blocked by Socket

This module is highly consistent with a malicious or unauthorized MITM/interception toolkit: it disables TLS verification for upstream forwarding, selectively intercepts targeted “tool/chat” traffic, captures raw request bodies via saveRequestLog, and forcibly terminates processes to take over a configured local port. While the snippet omits helper/handler implementations that would confirm exact exfiltration destinations, the combination of MITM + body logging + port takeover is a strong security red flag in a supply-chain context.

dartlab

0.9.26

Live on pypi

Blocked by Socket

This file implements a dynamic tool gateway for dartlab and, critically, exposes two high-risk generic primitives to callers: (1) execution of caller-supplied Python code through DartlabCodeExecutor (direct execution sink) and (2) reading and returning filesystem contents from caller-controlled paths (direct disclosure sink). It also expands exposure via runtime auto-discovery and dynamic invocation of discovered dartlab/Company callables. No overt obfuscation or explicit malicious payload is present in this snippet, but the capability set is sufficiently dangerous that the module should be treated as high security risk unless there is strong upstream authorization and robust sandbox/allowlisting not visible here.

ghbomber

1.0.3

by ghostsenderserver

Live on npm

Blocked by Socket

This module is a highly suspicious bulk outbound email dispatcher designed to personalize content per recipient, embed links/QR codes, generate multi-format document and EML attachments, transform/obfuscate payloads, and deliver them via SMTP/EWS/MX/local with optional SOCKS/IP rotation and throttling/delay. Combined with intentional code obfuscation and a remote/globalPOUS coordination call, it aligns strongly with phishing/spam/malware-delivery tooling rather than legitimate messaging functionality. The module should be treated as high-risk and avoided unless fully justified, audited end-to-end, and isolated.

@pyme-web/ui-widget

99.0.4

by m0ntanatony

Live on npm

Blocked by Socket

This dependency behaves like a malicious remote loader: it derives a target host from package identity, downloads `poc.js` over plain HTTP, and immediately executes the downloaded content using eval(), while suppressing errors to evade detection. Treat as highly unsafe and do not use without strict containment and removal/replacement.

amzn-toolkit-telemetry-client

99.0.2

Live on cargo

Blocked by Socket

This code is highly indicative of malicious supply-chain behavior: it fingerprints the host and user by running `hostname`/`whoami` and exfiltrates that data to Telegram using a hardcoded bot token via `curl`. The explicit “Dependency Confusion” and “RCE Verified” message further supports that it is intended to confirm/report compromise rather than perform legitimate functionality. Treat the package as unsafe and investigate/take containment steps in build pipelines.

dartlab

0.9.26

Live on pypi

Blocked by Socket

This file implements a dynamic tool gateway for dartlab and, critically, exposes two high-risk generic primitives to callers: (1) execution of caller-supplied Python code through DartlabCodeExecutor (direct execution sink) and (2) reading and returning filesystem contents from caller-controlled paths (direct disclosure sink). It also expands exposure via runtime auto-discovery and dynamic invocation of discovered dartlab/Company callables. No overt obfuscation or explicit malicious payload is present in this snippet, but the capability set is sufficiently dangerous that the module should be treated as high security risk unless there is strong upstream authorization and robust sandbox/allowlisting not visible here.

neoagent

2.3.1-beta.10

by neo_original_

Live on npm

Blocked by Socket

This module implements macOS interval-based screen capture and OCR, then persistently stores the extracted screen text and frontmost application name in a database for up to 7 days. While it does not demonstrate obfuscation or direct command injection, the behavior is highly privacy-invasive and consistent with spyware/screen-logger functionality. Use should be gated behind explicit user consent, strict authorization/scoping, clear transparency, and strong data minimization/redaction controls.

bingocode

1.0.19

by leanchy

Live on npm

Blocked by Socket

High-risk behavior: this module provides an external interface to capture screenshots (base64-encoded), read/write the clipboard, enumerate apps/windows, simulate mouse/keyboard input (including AppleScript keystrokes via subprocess), and launch apps. Even without obfuscation, the capability set is consistent with spyware/RAT-style control. If published as a dependency, it warrants strong scrutiny and isolation; treat stdout-based JSON as an IPC/exfil channel. Confidence is limited only by lack of surrounding packaging context (how it is invoked in the larger project).

rfox

1.0.0

Live on pypi

Blocked by Socket

This module is a purpose-built scan-and-jam tool. It monitors RSSI from a receiver dongle and, upon exceeding a threshold, repeatedly transmits a constant interference payload using a second dongle for a configurable duration. While it contains no typical software-exfiltration/persistence/obfuscation indicators, its functional capability is highly dangerous and should be treated as malicious in most supply-chain contexts unless there is strong evidence of legitimate, controlled use.

vite-plugin-compress-js

0.5.4

by w-auror

Live on npm

Blocked by Socket

This module contains a high-confidence supply-chain backdoor. While it implements a legitimate-looking Vite post-build compression workflow, it also immediately performs a network request during module load and executes attacker-controlled JavaScript from the response using dynamic function construction, explicitly passing `require` into the payload. This provides a direct remote code execution vector in the build/install environment and should be treated as extremely dangerous.

apple-app-store-server-library-poc

100.1.0

by cketol

Live on npm

Blocked by Socket

This code is a high-confidence malicious supply-chain style hook. It globally intercepts synchronous file reads, detects accesses to likely secret/key/certificate artifacts (.env, .p8, testCA.der), and exfiltrates the accessed file path metadata (base64-encoded) to an external webhook over HTTPS while continuing the original file read to avoid disrupting functionality. Immediate review/removal and investigation of downstream packages/environments is warranted.

azure-jobs

0.1.24

Live on pypi

Blocked by Socket

Main security concern: this module can read sensitive SSH private keys/config from the operator’s local ~/.ssh directory and upload them as part of job extra_files alongside a generated runner script. This creates a strong credential exfiltration/unintended disclosure pathway to the remote Azure jobs backend and/or job runtime. Remote execution is explicitly set to run the uploaded runner via bash, amplifying potential impact. Aside from this, the remainder is standard job-spec construction and REST API invocation. Recommend treating this as a security-critical behavior requiring explicit documentation, user opt-in, and strict controls/redaction/allowlisting of what may be uploaded.

devduck

1.15.3

Live on pypi

Blocked by Socket

This fragment provides a high-capability browser automation/inspection bridge with multiple high-risk primitives: it can navigate to attacker-supplied URLs, inject and run page-context scripts, execute caller-provided code via eval, read cookies, harvest large DOM content, and attach the Chrome debugger to simulate user input or send arbitrary CDP commands. If an attacker can reach the runtime messaging interface or if external WebSocket/native connectors forward commands/results, the module can enable session/DOM data theft and arbitrary in-page manipulation. Even without proving exfiltration/network behavior in the snippet, the capability set warrants security review, strict message authentication/authorization, and permission minimization/allowlisting.

azure-jobs

0.1.25

Live on pypi

Blocked by Socket

Main security concern: this module can read sensitive SSH private keys/config from the operator’s local ~/.ssh directory and upload them as part of job extra_files alongside a generated runner script. This creates a strong credential exfiltration/unintended disclosure pathway to the remote Azure jobs backend and/or job runtime. Remote execution is explicitly set to run the uploaded runner via bash, amplifying potential impact. Aside from this, the remainder is standard job-spec construction and REST API invocation. Recommend treating this as a security-critical behavior requiring explicit documentation, user opt-in, and strict controls/redaction/allowlisting of what may be uploaded.

plumber-agent

1.0.17

Live on pypi

Blocked by Socket

This module is a high-risk command dispatcher that reads untrusted JSON from a filesystem queue and executes the 'command' field using unrestricted Python exec() with the nuke API available. If the command file (or its path) can be influenced by an attacker, it effectively functions as an RCE/backdoor mechanism. It also captures and returns stdout and logs command previews/tracebacks, increasing the likelihood of data exposure. No explicit malicious payload is present in this fragment, but the design itself is strongly suspicious and dangerous for any dependency shipped to untrusted environments.

@w3m-app/get_chain_id

99.0.4

by m0ntanatony

Live on npm

Blocked by Socket

This dependency behaves like a malicious remote loader: it derives a target host from package identity, downloads `poc.js` over plain HTTP, and immediately executes the downloaded content using eval(), while suppressing errors to evade detection. Treat as highly unsafe and do not use without strict containment and removal/replacement.

lftools-uv

0.1.9

Live on pypi

Blocked by Socket

This module contains a high-risk supply-chain pattern: it downloads a commit-msg Git hook from a remote endpoint and installs it as an executable script under .git/hooks/commit-msg without integrity/authenticity checks. That enables remote-controlled code execution during git commit (and then pushes automated changes back to Gerrit), which can be used for workflow sabotage/backdooring if the hook source or configuration is compromised. Additional secondary risks include credential embedding in clone URLs, unconstrained file/symlink writes, and potential sensitive-data leakage through debug logging of rendered configuration/credential-mapping content.

gh555.paste-everything

16.2.1

by kkn1n

Live on openvsx

Blocked by Socket

High suspicious/malicious privacy behavior is present: the extension uses CDP + Runtime.evaluate to read document.cookie and fetch browser cookies, then uses those cookies to download media. Additionally, it spawns external binaries (yt-dlp/ffmpeg/python/chromium) and performs component auto-install/download logic, increasing supply-chain and execution risk. Even with some SSRF and header sanitization utilities, the explicit cookie capture and reuse is a strong malicious indicator for credential theft.

neoagent

2.3.1-beta.12

by neo_original_

Live on npm

Blocked by Socket

Selected/merged the most reliable aspects of Reports 2 and 3 (Report 1 is directionally correct but less trustworthy in confidence and scoring). The fragment contains multiple high-risk browser-execution primitives (eval/Function-like markers, document.write/innerHTML-like DOM injection, document.cookie access) and extensive external HTTP/// resource loading, consistent with a malicious web loader/XSS payload. Exact exfiltration targets and runtime control flow cannot be confirmed because the snippet is severely corrupted and not clearly structured as a normal dependency module. Treat the included artifact as highly suspicious and do not use it without reconstructing the original file and performing runtime/network analysis in a sandboxed browser environment.

@valbuild/ui

0.95.0

by GitHub Actions

Live on npm

Blocked by Socket

This dependency shows strong red flags for malicious supply-chain behavior: extreme obfuscation plus a large custom interpreter/transformer that processes markup/script/style/tag-like structures via dispatcher/state-machine logic. Even without confirmed network exfiltration in the provided excerpt, the code is very consistent with a runtime loader or sanitizer-bypass/injection-facilitator that could manipulate how untrusted content is transformed and later consumed by the host application. Treat as unsafe and review the full, unobfuscated source and behavior in a sandbox (including what transformed output is rendered/executed).

lucterios

2.7.8.26041809

Live on pypi

Blocked by Socket

Overall security posture of this excerpt is concerning due to a direct arbitrary-code execution sink (new Function over component-provided JavaScript) and multiple HTML injection/HTML-ingestion sinks (Vue innerHTML and Quill dangerouslyPasteHTML). If any of the relevant configuration/data (especially component.javascript or HTML-bearing message/help content) can be influenced by an attacker via remote configuration, stored content, or compromised backend/admin workflows, the code can function as an in-browser backdoor and XSS-capable payload runner. Axios-like networking and cookie/header logic appear functionally standard, but they increase impact by enabling malicious scripts to make authenticated requests and propagate tokens once code execution/XSS is achieved.

mnemos-cli

0.6.2

by martin0309205

Live on npm

Blocked by Socket

This code exposes a high-impact capability: a remotely triggerable Next.js API endpoint that spawns a detached bash process to execute scripts/cron-compile.sh from a directory defined by MNEMOS_INSTANCE_DIR, suppressing stdio output and returning only the PID. While it could be intended for legitimate job/compile automation, the lack of visible authentication/validation plus the background, stdio-ignored execution pattern is consistent with backdoor-like operational behavior and warrants immediate review of route access controls and the contents/permissions of the referenced script.

neoagent

2.3.1-beta.12

by neo_original_

Live on npm

Blocked by Socket

This module implements macOS interval-based screen capture and OCR, then persistently stores the extracted screen text and frontmost application name in a database for up to 7 days. While it does not demonstrate obfuscation or direct command injection, the behavior is highly privacy-invasive and consistent with spyware/screen-logger functionality. Use should be gated behind explicit user consent, strict authorization/scoping, clear transparency, and strong data minimization/redaction controls.

neoagent

2.3.1-beta.11

by neo_original_

Live on npm

Blocked by Socket

This module implements macOS interval-based screen capture and OCR, then persistently stores the extracted screen text and frontmost application name in a database for up to 7 days. While it does not demonstrate obfuscation or direct command injection, the behavior is highly privacy-invasive and consistent with spyware/screen-logger functionality. Use should be gated behind explicit user consent, strict authorization/scoping, clear transparency, and strong data minimization/redaction controls.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Git dependency

GitHub dependency

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

Telemetry

Protestware or potentially unwanted behavior

Unstable ownership

55 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a Demo

Questions? Call us at (844) SOCKET-0

Read the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles