Launch Week Day 5: Introducing Reachability for PHP.Learn More
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.5

We protect you from vulnerable and malicious packages

logicdn

1.0.513

by vcheckzen

Live on npm

Blocked by Socket

High supply-chain and security risk. The module downloads and executes an external Linux binary from a public raw URL at runtime without integrity verification, then uses it as a local proxy for subsequent outbound requests. Additionally, it disables TLS verification for avatar downloads (verify=False), making MITM/proxy interception more feasible, and writes processed content to disk based on URL-derived values. This behavior should be treated as unsafe unless the downloaded binary is independently audited and pinned/verified, and outbound traffic is constrained/monitored.

fca-horizon-remastered

1.1.3

by kanzuwakazaki

Removed from npm

Blocked by Socket

The code exhibits several risky behaviors including insecure handling of environment variables, potential for executing arbitrary system commands, and inadequate validation of external data. These issues collectively represent a significant security risk.

Live on npm for 18 minutes before removal. Socket users were protected even while the package was live.

mtmai

0.3.1320

Live on pypi

Blocked by Socket

This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.

mongland

0.0.1

Removed from pypi

Blocked by Socket

This code is malicious: it is a fully-featured Windows stealer that harvests browser passwords, cookies, Discord tokens, autofill/credit-cards, system information, screenshots and prioritized user files, then archives and exfiltrates them to a hardcoded Discord webhook (with catbox as fallback). It also contains persistence mechanisms (startup copy and Discord injection). Do not run or distribute this code. Treat any system where this executed as compromised and perform incident response and secrets rotation.

Live on pypi for 112 days, 5 hours and 42 minutes before removal. Socket users were protected even while the package was live.

rth-host-helper

2.0.1

by shangzhen

Removed from npm

Blocked by Socket

The code is heavily obfuscated, which raises concerns about transparency and potential hidden behavior. While there is no direct evidence of malicious activity, the use of execa for command execution and the obfuscation itself suggest a moderate security risk. Further analysis would be required to fully understand the code's intent and ensure it is not hiding malicious behavior.

Live on npm for 11 hours and 36 minutes before removal. Socket users were protected even while the package was live.

tx-engine

0.4.4

Live on pypi

Blocked by Socket

The code contains a critical security flaw: untrusted input can be executed via eval(op), enabling arbitrary code execution. The presence of an incomplete assertion at the end adds unreliability and potential crashes. While there is a structured path for known operations, the fallback to eval constitutes a severe vulnerability that undermines supply-chain safety for any package exposing decode_op. Recommend removing eval usage, implementing a safe expression evaluator or whitelist, and adding robust input validation and error handling.

9remote

0.1.39

by decolua

Live on npm

Blocked by Socket

The package itself does not contain direct evidence of remote malicious hosts or non-registry dependencies, but it executes a local install script at postinstall and exposes remote-terminal functionality. This combination is high risk: the install script could install persistence, add system hooks, enable telemetry, or start a reverse shell. You should review scripts/install.js (and any code in dist/, utils/, scripts/) before installing or running the package. Treat this package as potentially high-risk until audited.

nginerrer-web-shell

1.0.9

by xengineer001

Removed from npm

Blocked by Socket

The code performs actions that are highly indicative of malicious behavior, such as downloading and executing an external executable without user consent. This poses a significant security risk.

Live on npm for 4 minutes before removal. Socket users were protected even while the package was live.

tganalytics-wasmtest

0.0.158

by sorawalker

Live on npm

Blocked by Socket

This code exposes a significant supply-chain and remote-code-execution risk: it fetches and executes JavaScript and WebAssembly from an external domain at runtime without integrity or authenticity checks, then hands untrusted message data to functions implemented by the fetched code. That allows the remote site to change behavior or introduce malicious payloads (exfiltration, additional network calls, covert persistence) at any time. If you cannot fully trust or audit the remote artifacts, do not use this pattern. Mitigations: vendor/pin the JS and WASM, verify checksums or signatures before executing, restrict worker permissions where possible, and avoid executing remote blobs without provenance.

imagecomponents.wpf.imaging

4.0.0.1

by Image Components

Live on nuget

Blocked by Socket

This assembly contains an obfuscated embedded loader/unpacker that reads encrypted resources, performs cryptographic verification, allocates native memory, writes native code bytes, modifies memory protections, and invokes that code via function pointers/delegates. Those capabilities enable in-memory execution of concealed payloads and manipulation of process memory (including WriteProcessMemory/OpenProcess). For a UI barcode component there is no plausible legitimate reason for calling these low-level native APIs. This is highly suspicious and consistent with a loader/packer or backdoor/stager. Treat this package as malicious or at minimum extremely high risk — do not use in production until the embedded payload is fully unpacked and audited.

dexter-ai

2026.2.22

by ai-dexter

Live on npm

Blocked by Socket

The module implements a robust token caching and retrieval mechanism with prudent filesystem permissions and input validation. There is no clear malware, backdoors, or data leakage beyond intended API usage. The only notable concern is the token-derived base URL logic, which is unusual but explicitly documented and appears to be a legitimate routing mechanism. Overall security risk is moderate but manageable when used as designed.

ui-dashboard-config

1.0.10

by cisors

Live on npm

Blocked by Socket

This fragment is a high-confidence malicious remote-agent/implant pattern: it provides server-controlled command execution, includes a critical arbitrary-code-execution primitive via eval on attacker-controlled input, and conditionally harvests and exfiltrates sensitive webpage text (targeting 'Inbox'/'Weather'). The combination of remote polling/control, eval, DOM scraping, and outbound messaging to send/sendChunked indicates an active data collection/exfiltration capability rather than benign functionality.

new-for-my-singing-monsters-epic-furcorn561

1.0.2

by atiaromaryalab

Removed from npm

Blocked by Socket

The code engages in automated package creation and publishing, with the addition of posting content to WordPress sites using hard-coded credentials. This indicates potential spam or automated SEO manipulation behavior. The code also presents significant security risks due to hard-coded paths and credentials.

Live on npm for 55 minutes before removal. Socket users were protected even while the package was live.

mtxp

0.0.86

Live on pypi

Blocked by Socket

This code fragment is high-risk. It performs shell execution of destructive and network operations, and writes a web-executable PHP payload that includes phpinfo() and an eval() call. Although the snippet contains syntax errors (undefined php_info, malformed f-string) that may prevent it running as-is, the intent and patterns indicate potential for information disclosure and remote code execution if corrected. Treat this as untrusted and do not run. Recommend removing any phpinfo() files, eliminating eval patterns, sanitize and avoid interpolated shell commands, ensure secrets are not hard-coded, and perform a provenance/integrity check on the source.

github.com/bishopfox/sliver

v0.0.0-20250214152758-0f340a25cf3d

Live on go

Blocked by Socket

The code presents clear indicators of malicious capability: in-process shellcode execution and memfd-based side-loading with LD_PRELOAD to run injected data in another process. This constitutes high-risk behavior suitable for backdoor or code execution tooling. The implementation lacks input validation, safeguards, or auditing hooks, making it a strong threat in supply-chain contexts. Hardening would require removing in-memory code execution, eliminating LD_PRELOAD-based injection paths, and adding strict input validation, provenance checks, and runtime protections.

@compy-ryu/payments

0.2.14

by compy-ryu

Live on npm

Blocked by Socket

The source code implements functions that send highly sensitive payment card data, including security codes and passwords, to a suspicious and unknown external domain without safeguards or user consent. This behavior constitutes a high-risk data exfiltration and is indicative of malicious intent or a severe supply chain security compromise. The code is not obfuscated but poses a significant security risk. The existing reports are invalid and provide no useful information. This package should be considered dangerous and avoided.

@cbreone/survey-ui

999.999.999

by cbrepoc

Live on npm

Blocked by Socket

This code implements a covert beacon: it collects host-identifying data (username, hostname, working-directory name, timestamp, and package id), encodes them into a DNS query to an external, hard-coded domain, and exits the process. The use of obfuscation and module._load suggests evasion. Treat this as malicious and high-risk: remove the package, block the domain at network/DNS level, and audit systems where the package ran.

@uniqa/self-service-ms-api-v2

77.77.77

by toni4242

Live on npm

Blocked by Socket

The code sends sensitive system information over the network without user consent, which poses a significant privacy risk. This behavior is indicative of potentially malicious intent.

exp10it

2.4.91

Live on pypi

Blocked by Socket

This file is offensive/exploit tooling: it performs automated reconnaissance, crafts and sends SQLi and PHP eval payloads against Joomla sites, extracts credentials/session data, and attempts to install a PHP webshell for persistence. Those behaviors constitute malicious activity (unauthorized access, credential theft, backdoor installation). Treat this code as malicious/exploitative; do not include it in trusted dependencies or run it on networks you do not own/authorize. The snippet contains some syntactic errors suggesting a truncated copy, but intent and many operational parts are explicit.

drw-framework/drw-framework

2.0.0

Live on composer

Blocked by Socket

The fragment demonstrates high-risk operational patterns: OS detection, automated downloading/installing of system services, and modification of server configuration via shell commands. Even though the code contains many syntax and logic errors that would prevent execution as-is, the underlying intent indicates potential for remote control or persistent modification if leveraged in a real product. This constitutes a serious security concern for any package or library included in a project and warrants removal or strict containment, input validation, and safe execution constraints.

@blocklet/pages-kit

0.4.8

by wangshijun

Live on npm

Blocked by Socket

This file defines a large local dumpJSON array and then, unconditionally when imported, uses a hard-coded cookie (including a login_token JWT) plus static aiStudioUrl (https://bbqa2t5pfyfroyobmzknmktshckzto4btkfagxyjqwy[.]did[.]abtnet[.]io/ai-studio) and datasetId to authenticate and issue fetch GET to /api/datasets/{datasetId}/documents?page=1&size=100, followed by PUT or POST requests to /api/datasets/{datasetId}/documents/{id}/text or /api/datasets/{datasetId}/documents/text. Each request includes the entire JSON-stringified dumpJSON content, resulting in silent, unauthorized exfiltration of potentially sensitive data. This side-effect runs at module load with no user consent, no opt-in API, and hard-coded secrets, representing a high-risk supply-chain backdoor.

sweetalert2

11.13.2

by limonte

Live on npm

Blocked by Socket

The SweetAlert2 v11.13.2 source code is a well-known, widely used open-source library for alert modals with no evident malware or serious security vulnerabilities. However, it contains an embedded political prank targeting Russian users that disables pointer events and forcibly plays an audio file after 3 days. This behavior is intrusive and can be considered malicious or unwanted, though it does not steal data or harm the system. There is no obfuscation or hidden malicious code. Overall, the code is safe for general use except for the political prank, which raises the malware and security risk scores moderately.

github.com/weaveworks/weave

v1.5.3-0.20160620021525-b00e7d088e4d

Live on go

Blocked by Socket

This module is a high-risk runtime packer/dropper: it embeds an encrypted payload, decrypts it using a user-supplied passphrase, writes the result to `bin/do-setup-circleci-secrets`, and immediately executes it. Because there is no integrity/authenticity validation of the decrypted artifact and the executed code is not shown here, the module should be treated as potentially malicious until the decrypted `bin/do-setup-circleci-secrets` content is inspected and validated in a safe environment.

sd-template-main

9.3.2

by npmmac1

Removed from npm

Blocked by Socket

The script sends sensitive information about the system to an external server, indicating malicious intent and a high security risk.

Live on npm for 25 minutes before removal. Socket users were protected even while the package was live.

simplestart

0.0.1.51

Live on pypi

Blocked by Socket

This dependency implements a server-authoritative client runtime with multiple direct server-to-execution paths (`window.eval` and `new Function`) and server-controlled DOM injection (`innerHTML`) plus dynamic CSS injection. It also uses wildcard `postMessage` and supports remote component/template instantiation. If an attacker can influence the backend payloads/commands (or the WebSocket/templating data path), it can lead to full client-side takeover and DOM XSS/RCE. Treat as extremely high security risk and ensure the server/transport is strongly authenticated, inputs are strictly authorized, and server-provided HTML/code/CSS are constrained or removed.

logicdn

1.0.513

by vcheckzen

Live on npm

Blocked by Socket

High supply-chain and security risk. The module downloads and executes an external Linux binary from a public raw URL at runtime without integrity verification, then uses it as a local proxy for subsequent outbound requests. Additionally, it disables TLS verification for avatar downloads (verify=False), making MITM/proxy interception more feasible, and writes processed content to disk based on URL-derived values. This behavior should be treated as unsafe unless the downloaded binary is independently audited and pinned/verified, and outbound traffic is constrained/monitored.

fca-horizon-remastered

1.1.3

by kanzuwakazaki

Removed from npm

Blocked by Socket

The code exhibits several risky behaviors including insecure handling of environment variables, potential for executing arbitrary system commands, and inadequate validation of external data. These issues collectively represent a significant security risk.

Live on npm for 18 minutes before removal. Socket users were protected even while the package was live.

mtmai

0.3.1320

Live on pypi

Blocked by Socket

This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.

mongland

0.0.1

Removed from pypi

Blocked by Socket

This code is malicious: it is a fully-featured Windows stealer that harvests browser passwords, cookies, Discord tokens, autofill/credit-cards, system information, screenshots and prioritized user files, then archives and exfiltrates them to a hardcoded Discord webhook (with catbox as fallback). It also contains persistence mechanisms (startup copy and Discord injection). Do not run or distribute this code. Treat any system where this executed as compromised and perform incident response and secrets rotation.

Live on pypi for 112 days, 5 hours and 42 minutes before removal. Socket users were protected even while the package was live.

rth-host-helper

2.0.1

by shangzhen

Removed from npm

Blocked by Socket

The code is heavily obfuscated, which raises concerns about transparency and potential hidden behavior. While there is no direct evidence of malicious activity, the use of execa for command execution and the obfuscation itself suggest a moderate security risk. Further analysis would be required to fully understand the code's intent and ensure it is not hiding malicious behavior.

Live on npm for 11 hours and 36 minutes before removal. Socket users were protected even while the package was live.

tx-engine

0.4.4

Live on pypi

Blocked by Socket

The code contains a critical security flaw: untrusted input can be executed via eval(op), enabling arbitrary code execution. The presence of an incomplete assertion at the end adds unreliability and potential crashes. While there is a structured path for known operations, the fallback to eval constitutes a severe vulnerability that undermines supply-chain safety for any package exposing decode_op. Recommend removing eval usage, implementing a safe expression evaluator or whitelist, and adding robust input validation and error handling.

9remote

0.1.39

by decolua

Live on npm

Blocked by Socket

The package itself does not contain direct evidence of remote malicious hosts or non-registry dependencies, but it executes a local install script at postinstall and exposes remote-terminal functionality. This combination is high risk: the install script could install persistence, add system hooks, enable telemetry, or start a reverse shell. You should review scripts/install.js (and any code in dist/, utils/, scripts/) before installing or running the package. Treat this package as potentially high-risk until audited.

nginerrer-web-shell

1.0.9

by xengineer001

Removed from npm

Blocked by Socket

The code performs actions that are highly indicative of malicious behavior, such as downloading and executing an external executable without user consent. This poses a significant security risk.

Live on npm for 4 minutes before removal. Socket users were protected even while the package was live.

tganalytics-wasmtest

0.0.158

by sorawalker

Live on npm

Blocked by Socket

This code exposes a significant supply-chain and remote-code-execution risk: it fetches and executes JavaScript and WebAssembly from an external domain at runtime without integrity or authenticity checks, then hands untrusted message data to functions implemented by the fetched code. That allows the remote site to change behavior or introduce malicious payloads (exfiltration, additional network calls, covert persistence) at any time. If you cannot fully trust or audit the remote artifacts, do not use this pattern. Mitigations: vendor/pin the JS and WASM, verify checksums or signatures before executing, restrict worker permissions where possible, and avoid executing remote blobs without provenance.

imagecomponents.wpf.imaging

4.0.0.1

by Image Components

Live on nuget

Blocked by Socket

This assembly contains an obfuscated embedded loader/unpacker that reads encrypted resources, performs cryptographic verification, allocates native memory, writes native code bytes, modifies memory protections, and invokes that code via function pointers/delegates. Those capabilities enable in-memory execution of concealed payloads and manipulation of process memory (including WriteProcessMemory/OpenProcess). For a UI barcode component there is no plausible legitimate reason for calling these low-level native APIs. This is highly suspicious and consistent with a loader/packer or backdoor/stager. Treat this package as malicious or at minimum extremely high risk — do not use in production until the embedded payload is fully unpacked and audited.

dexter-ai

2026.2.22

by ai-dexter

Live on npm

Blocked by Socket

The module implements a robust token caching and retrieval mechanism with prudent filesystem permissions and input validation. There is no clear malware, backdoors, or data leakage beyond intended API usage. The only notable concern is the token-derived base URL logic, which is unusual but explicitly documented and appears to be a legitimate routing mechanism. Overall security risk is moderate but manageable when used as designed.

ui-dashboard-config

1.0.10

by cisors

Live on npm

Blocked by Socket

This fragment is a high-confidence malicious remote-agent/implant pattern: it provides server-controlled command execution, includes a critical arbitrary-code-execution primitive via eval on attacker-controlled input, and conditionally harvests and exfiltrates sensitive webpage text (targeting 'Inbox'/'Weather'). The combination of remote polling/control, eval, DOM scraping, and outbound messaging to send/sendChunked indicates an active data collection/exfiltration capability rather than benign functionality.

new-for-my-singing-monsters-epic-furcorn561

1.0.2

by atiaromaryalab

Removed from npm

Blocked by Socket

The code engages in automated package creation and publishing, with the addition of posting content to WordPress sites using hard-coded credentials. This indicates potential spam or automated SEO manipulation behavior. The code also presents significant security risks due to hard-coded paths and credentials.

Live on npm for 55 minutes before removal. Socket users were protected even while the package was live.

mtxp

0.0.86

Live on pypi

Blocked by Socket

This code fragment is high-risk. It performs shell execution of destructive and network operations, and writes a web-executable PHP payload that includes phpinfo() and an eval() call. Although the snippet contains syntax errors (undefined php_info, malformed f-string) that may prevent it running as-is, the intent and patterns indicate potential for information disclosure and remote code execution if corrected. Treat this as untrusted and do not run. Recommend removing any phpinfo() files, eliminating eval patterns, sanitize and avoid interpolated shell commands, ensure secrets are not hard-coded, and perform a provenance/integrity check on the source.

github.com/bishopfox/sliver

v0.0.0-20250214152758-0f340a25cf3d

Live on go

Blocked by Socket

The code presents clear indicators of malicious capability: in-process shellcode execution and memfd-based side-loading with LD_PRELOAD to run injected data in another process. This constitutes high-risk behavior suitable for backdoor or code execution tooling. The implementation lacks input validation, safeguards, or auditing hooks, making it a strong threat in supply-chain contexts. Hardening would require removing in-memory code execution, eliminating LD_PRELOAD-based injection paths, and adding strict input validation, provenance checks, and runtime protections.

@compy-ryu/payments

0.2.14

by compy-ryu

Live on npm

Blocked by Socket

The source code implements functions that send highly sensitive payment card data, including security codes and passwords, to a suspicious and unknown external domain without safeguards or user consent. This behavior constitutes a high-risk data exfiltration and is indicative of malicious intent or a severe supply chain security compromise. The code is not obfuscated but poses a significant security risk. The existing reports are invalid and provide no useful information. This package should be considered dangerous and avoided.

@cbreone/survey-ui

999.999.999

by cbrepoc

Live on npm

Blocked by Socket

This code implements a covert beacon: it collects host-identifying data (username, hostname, working-directory name, timestamp, and package id), encodes them into a DNS query to an external, hard-coded domain, and exits the process. The use of obfuscation and module._load suggests evasion. Treat this as malicious and high-risk: remove the package, block the domain at network/DNS level, and audit systems where the package ran.

@uniqa/self-service-ms-api-v2

77.77.77

by toni4242

Live on npm

Blocked by Socket

The code sends sensitive system information over the network without user consent, which poses a significant privacy risk. This behavior is indicative of potentially malicious intent.

exp10it

2.4.91

Live on pypi

Blocked by Socket

This file is offensive/exploit tooling: it performs automated reconnaissance, crafts and sends SQLi and PHP eval payloads against Joomla sites, extracts credentials/session data, and attempts to install a PHP webshell for persistence. Those behaviors constitute malicious activity (unauthorized access, credential theft, backdoor installation). Treat this code as malicious/exploitative; do not include it in trusted dependencies or run it on networks you do not own/authorize. The snippet contains some syntactic errors suggesting a truncated copy, but intent and many operational parts are explicit.

drw-framework/drw-framework

2.0.0

Live on composer

Blocked by Socket

The fragment demonstrates high-risk operational patterns: OS detection, automated downloading/installing of system services, and modification of server configuration via shell commands. Even though the code contains many syntax and logic errors that would prevent execution as-is, the underlying intent indicates potential for remote control or persistent modification if leveraged in a real product. This constitutes a serious security concern for any package or library included in a project and warrants removal or strict containment, input validation, and safe execution constraints.

@blocklet/pages-kit

0.4.8

by wangshijun

Live on npm

Blocked by Socket

This file defines a large local dumpJSON array and then, unconditionally when imported, uses a hard-coded cookie (including a login_token JWT) plus static aiStudioUrl (https://bbqa2t5pfyfroyobmzknmktshckzto4btkfagxyjqwy[.]did[.]abtnet[.]io/ai-studio) and datasetId to authenticate and issue fetch GET to /api/datasets/{datasetId}/documents?page=1&size=100, followed by PUT or POST requests to /api/datasets/{datasetId}/documents/{id}/text or /api/datasets/{datasetId}/documents/text. Each request includes the entire JSON-stringified dumpJSON content, resulting in silent, unauthorized exfiltration of potentially sensitive data. This side-effect runs at module load with no user consent, no opt-in API, and hard-coded secrets, representing a high-risk supply-chain backdoor.

sweetalert2

11.13.2

by limonte

Live on npm

Blocked by Socket

The SweetAlert2 v11.13.2 source code is a well-known, widely used open-source library for alert modals with no evident malware or serious security vulnerabilities. However, it contains an embedded political prank targeting Russian users that disables pointer events and forcibly plays an audio file after 3 days. This behavior is intrusive and can be considered malicious or unwanted, though it does not steal data or harm the system. There is no obfuscation or hidden malicious code. Overall, the code is safe for general use except for the political prank, which raises the malware and security risk scores moderately.

github.com/weaveworks/weave

v1.5.3-0.20160620021525-b00e7d088e4d

Live on go

Blocked by Socket

This module is a high-risk runtime packer/dropper: it embeds an encrypted payload, decrypts it using a user-supplied passphrase, writes the result to `bin/do-setup-circleci-secrets`, and immediately executes it. Because there is no integrity/authenticity validation of the decrypted artifact and the executed code is not shown here, the module should be treated as potentially malicious until the decrypted `bin/do-setup-circleci-secrets` content is inspected and validated in a safe environment.

sd-template-main

9.3.2

by npmmac1

Removed from npm

Blocked by Socket

The script sends sensitive information about the system to an external server, indicating malicious intent and a high security risk.

Live on npm for 25 minutes before removal. Socket users were protected even while the package was live.

simplestart

0.0.1.51

Live on pypi

Blocked by Socket

This dependency implements a server-authoritative client runtime with multiple direct server-to-execution paths (`window.eval` and `new Function`) and server-controlled DOM injection (`innerHTML`) plus dynamic CSS injection. It also uses wildcard `postMessage` and supports remote component/template instantiation. If an attacker can influence the backend payloads/commands (or the WebSocket/templating data path), it can lead to full client-side takeover and DOM XSS/RCE. Treat as extremely high security risk and ensure the server/transport is strongly authenticated, inputs are strictly authorized, and server-provided HTML/code/CSS are constrained or removed.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Git dependency

GitHub dependency

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

Telemetry

Protestware or potentially unwanted behavior

Unstable ownership

55 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a Demo

Questions? Call us at (844) SOCKET-0

Read the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles