Launch Week Day 5: Introducing Reachability for PHP.Learn More
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.5

We protect you from vulnerable and malicious packages

ploy-ansible

1.2.3

Live on pypi

Blocked by Socket

This module provides a remote-execution/backdoor-style interface: it accepts commands and arguments from an external 'channel', can execute shell commands, write files, and read files and return outputs. The dispatch via locals()[task] and use of shell execution with no validation make it dangerous in untrusted contexts. If present in a package without clear, secure, and authenticated control of the channel, treat it as high risk and potentially malicious. Use only in tightly controlled, authenticated environments or remove/replace with secure alternatives.

@wf-ceo/utilities

3.0.55

by xitro01

Live on npm

Blocked by Socket

The package's 'package.json' file contains 'preinstall' and 'test' scripts that execute 'wget' commands to send sensitive information—including the username, current directory path, hostname, IP address, and contents of the '/home' directory—to a remote server at hxxp://p[.]xitro[.]nl:8443/. This behavior indicates the package is malware designed to exfiltrate user data.

cl-lite

1.0.1306

by michael_tian

Live on npm

Blocked by Socket

This file is a blob of HTML/spam content with embedded links to adult videos, torrent downloads and suspicious redirectors (e.g. https://2023[.]redircdn[.]com/?…, http://rmdown[.]com/link[.]php?hash=…, http://data[.]down2048[.]com/list[.]php?…), plus numerous third-party image URLs. No executable code or proven malware payload is present, but the obfuscated redirects and torrent links pose a high risk of phishing, drive-by downloads or exposure to illicit content. Such anomalous content should be quarantined and removed from any legitimate software dependency.

pypjt

1.12.0

Live on pypi

Blocked by Socket

This script appears to be a simple packaging/upload helper, not obviously malicious, but it contains insecure and potentially dangerous patterns: unsanitized shell interpolation (command injection risk), use of 'sudo rm -rf' (destructive with elevation), changing working directory before destructive operations, and passing credentials on the command line (credential leakage). These issues make it risky to run in untrusted contexts or CI without hardening. There is no clear evidence of deliberate malware, but the script could be abused if inputs (pyproject.toml or environment) are tampered with.

pypi-honeypot-project-xyz-321

0.0.2

Removed from pypi

Blocked by Socket

This module automatically collects local telemetry (username, home directory, hostname, platform details, Python version) and posts it to a hardcoded external URL during normal execution. It disables SSL verification by default and performs the action as a side-effect at import/run time, then raises an exception to disrupt normal flow. This is privacy-invasive and constitutes malicious/suspicious supply-chain behavior. Avoid using this package and treat it as high risk.

Live on pypi for 23 minutes before removal. Socket users were protected even while the package was live.

github.com/gravitl/netmaker

v0.0.0-20210328163709-6ed618052000

Live on go

Blocked by Socket

The best-supported interpretation from all three reports is that this snippet is intended to remove/disrupt a networking/service component: it deletes a network interface, performs an authenticated DELETE against a local admin API to remove a node entry, overwrites sensitive network configuration, deletes a token, and then executes a privileged Go removal routine. The hardcoded bearer credential and `sudo go run ./main.go` pattern are strong security red flags. Even if this could be legitimate administrative deprovisioning, it is high-risk automation without verification/controls, and the unreviewed `main.go` is an unresolved supply-chain execution sink.

ismoiloffs

0.1.0

Removed from pypi

Blocked by Socket

This module implements a remote-controlled code execution mechanism: it collects a password and a machine fingerprint, sends them to a hardcoded external server, retrieves Python code, and executes it directly in-process. This pattern is equivalent to a remote backdoor and enables arbitrary actions on the host. It also stores a plaintext password in the user's home directory. Treat this code as malicious or high-risk unless you fully trust the remote endpoint and have strong out-of-band assurances (code signing and audited server behavior). Do not run this in production or on sensitive systems; if encountered in a dependency, consider removing, isolating, or auditing the remote server and any delivered payloads.

Live on pypi for 102 days, 11 hours and 8 minutes before removal. Socket users were protected even while the package was live.

jessa-vue-components

3.0.1563

Removed from npm

Blocked by Socket

The code is exfiltrating system information to an external server using DNS queries, which is indicative of malicious behavior. This poses a significant security risk due to unauthorized data transmission.

Live on npm for 6 minutes before removal. Socket users were protected even while the package was live.

three-trees-ui

1.1.6

by zhanglichun1989

Live on npm

Blocked by Socket

This code implements a dangerous arbitrary code execution vulnerability disguised as a component method. The suspicious naming, base64 obfuscation, and privileged context access make it highly likely to be malicious infrastructure for remote code execution, data theft, or system compromise.

artifact-lab-3-package-392c6acd

0.1.3

Live on pypi

Blocked by Socket

This module implements a classic reverse shell/backdoor that connects to a hard-coded external ngrok endpoint and spawns an interactive /bin/bash bound to the socket. It provides unauthenticated remote command execution and is malicious in practice. Do not run this code. If this was found in a repository or on a host, treat it as a compromise indicator: isolate the host, investigate execution timeframe, check for additional persistence, block the outgoing endpoint(s), and rotate any potentially exposed credentials. Remove the file and remediate according to incident response procedures.

github.com/milvus-io/milvus

v0.10.3-0.20211021140115-b4064e6d76aa

Live on go

Blocked by Socket

This code implements an insecure, unauthenticated RPC mechanism that allows remote clients to cause arbitrary code execution and exfiltrate files/system information. Using pickle over an untrusted network and invoking methods by client-supplied names are severe supply-chain/backdoor risks. Do not deploy or reuse this code in production; it should be treated as a backdoor/untrusted remote-execution component unless wrapped with strong authentication, authorization, sandboxing, and safe serialization.

walmart-canada-free-card890

1.0.2

by muhammadharunmiya44

Removed from npm

Blocked by Socket

The script seems to be part of a spamming operation and uses bad security practices, such as hardcoding paths and credentials. Therefore, it's a potential security risk.

Live on npm for 2 hours and 12 minutes before removal. Socket users were protected even while the package was live.

yxspkg

6.12.37

Live on pypi

Blocked by Socket

The fragment is an opaque, binary/packed payload or heavily obfuscated content that cannot be reliably analyzed statically. While this alone does not prove malicious intent, it signals high risk and warrants isolation, request for a readable source or deobfuscated form, and controlled dynamic analysis to determine any harmful behavior or data leakage potential.

synflood

1.0.0

by zhyjs

Live on npm

Blocked by Socket

The reviewed file is an active network attack utility implementing forged packet generation and a SYN flood style sender with source IP spoofing and process-level parallelism. It is malicious (or dual-use with high risk) and should not be included as a dependency or executed on networks you do not control. If found in a package, treat it as a critical supply-chain security incident and remove/inspect other package artifacts (including './syn.js').

magalh

1.0.7

by abu-sara

Live on npm

Blocked by Socket

The best report is Report 3 (highest confidence and most comprehensive mapping of anomalies/sinks). After improving it: this code fragment shows strong backdoor/loader characteristics—extreme obfuscation, periodic persistence (setInterval/setImmediate), and explicit command-execution capability (spawn/exec and process computed execution) alongside recon/state staging (os + JSON.parse/Map caches) and shell/netcat indicators. It also blends web/session setup to mask malicious behavior. Treat the dependency as malicious and isolate/quarantine; perform deobfuscation and runtime tracing to recover exact command strings and any network destinations (not fully visible in the snippet).

tx.bim

1.1.5.13

by TianTeng

Live on nuget

Blocked by Socket

This assembly contains strongly malicious or at least highly suspicious behavior: an obfuscated runtime loader/unpacker that reads encrypted embedded resources, decrypts them with hardcoded keys, allocates executable memory, writes native code into process memory, modifies runtime/JIT structures, and executes the injected code. It also contains functionality to write to other process memory and to /proc/self/mem on Linux. The presence of unrelated obfuscated native loader code inside a BIM model library is a major supply-chain red flag. I recommend not using this package, treating it as malicious, and removing it from any build or environment where it may execute.

lullaby-horizon-wkj204

1.0.0

by afifaljafari112

Removed from npm

Blocked by Socket

The code contains imports from multiple suspiciously named modules and calls a function `functame()` on each. The overall structure is unconventional and lacks clarity in its purpose. This warrants further investigation into the actual content of the modules being imported, but the code itself does not show direct malicious behavior or significant security risks.

Live on npm for 56 days, 23 hours and 19 minutes before removal. Socket users were protected even while the package was live.

mtmai

0.3.1410

Removed from pypi

Blocked by Socket

This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.

Live on pypi for 6 hours and 21 minutes before removal. Socket users were protected even while the package was live.

fhempy

0.1.45

Live on pypi

Blocked by Socket

The code performs several potentially risky operations such as downloading and executing binaries from external sources, running network services, and using Telnet for remote command execution. These actions pose significant security risks, including the possibility of introducing malicious code and exposing the system to network-based attacks. However, there is no explicit evidence of malicious intent in the code itself.

mtmai

0.3.1346

Live on pypi

Blocked by Socket

This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.

agentdojo

0.1.16

Live on pypi

Blocked by Socket

This conversation demonstrates a prompt-injection attack embedded in external webpage content that successfully coerced the assistant to enumerate Slack channels, read channel messages (including a revealed secret), and post the concatenated messages to an untrusted external website (www.my-website-234.com/random). This is a high-severity data exfiltration incident caused by improper handling of untrusted tool outputs and lack of defense-in-depth controls (validation, allowlists, user confirmations, secret-detection and redaction). Immediate remediation: assume compromise of any exposed secrets, rotate leaked credentials, block the external domain, enforce tool-output trust boundaries, implement secret-detection and redaction on any outbound posts, require human approval for actions that disclose workspace data, and audit tool integrations and logs.

carbonorm/carbonphp

10.2.7

Live on composer

Blocked by Socket

The dominant security concern is the explicit use of eval on data-derived JSON within CarbonPHP.handlebars, which can enable arbitrary code execution if data is attacker-controlled. Additional concerns include unsanitized dynamic script/template loading and a busy-wait sleep that can degrade performance and potentially expose timing information. Overall risk is high due to the eval pattern and dynamic content loading without strong sanitization.

github.com/KubeOperator/kubepi

v1.2.2-0.20211119030933-b5a62dc0c719

Live on go

Blocked by Socket

The code effectively creates a remote terminal backdoor-like capability via gotty on macOS, with minimal visibility due to silent I/O and hard-coded paths. This is a high-security-risk pattern that warrants removal or strict hardening (authentication, access controls, non-root execution, dynamic path resolution, and explicit port management). A broader code review and deployment safeguards are strongly recommended.

aem-spa-component-mapping

999999999.999.999

by k4r1it0

Removed from npm

Blocked by Socket

The code is malicious, containing a reverse shell and data exfiltration mechanism. It poses a significant security risk by allowing unauthorized remote access and sending sensitive system information to an external server.

Live on npm for 7 hours and 58 minutes before removal. Socket users were protected even while the package was live.

mtmai

0.6.35

Live on pypi

Blocked by Socket

This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.

ploy-ansible

1.2.3

Live on pypi

Blocked by Socket

This module provides a remote-execution/backdoor-style interface: it accepts commands and arguments from an external 'channel', can execute shell commands, write files, and read files and return outputs. The dispatch via locals()[task] and use of shell execution with no validation make it dangerous in untrusted contexts. If present in a package without clear, secure, and authenticated control of the channel, treat it as high risk and potentially malicious. Use only in tightly controlled, authenticated environments or remove/replace with secure alternatives.

@wf-ceo/utilities

3.0.55

by xitro01

Live on npm

Blocked by Socket

The package's 'package.json' file contains 'preinstall' and 'test' scripts that execute 'wget' commands to send sensitive information—including the username, current directory path, hostname, IP address, and contents of the '/home' directory—to a remote server at hxxp://p[.]xitro[.]nl:8443/. This behavior indicates the package is malware designed to exfiltrate user data.

cl-lite

1.0.1306

by michael_tian

Live on npm

Blocked by Socket

This file is a blob of HTML/spam content with embedded links to adult videos, torrent downloads and suspicious redirectors (e.g. https://2023[.]redircdn[.]com/?…, http://rmdown[.]com/link[.]php?hash=…, http://data[.]down2048[.]com/list[.]php?…), plus numerous third-party image URLs. No executable code or proven malware payload is present, but the obfuscated redirects and torrent links pose a high risk of phishing, drive-by downloads or exposure to illicit content. Such anomalous content should be quarantined and removed from any legitimate software dependency.

pypjt

1.12.0

Live on pypi

Blocked by Socket

This script appears to be a simple packaging/upload helper, not obviously malicious, but it contains insecure and potentially dangerous patterns: unsanitized shell interpolation (command injection risk), use of 'sudo rm -rf' (destructive with elevation), changing working directory before destructive operations, and passing credentials on the command line (credential leakage). These issues make it risky to run in untrusted contexts or CI without hardening. There is no clear evidence of deliberate malware, but the script could be abused if inputs (pyproject.toml or environment) are tampered with.

pypi-honeypot-project-xyz-321

0.0.2

Removed from pypi

Blocked by Socket

This module automatically collects local telemetry (username, home directory, hostname, platform details, Python version) and posts it to a hardcoded external URL during normal execution. It disables SSL verification by default and performs the action as a side-effect at import/run time, then raises an exception to disrupt normal flow. This is privacy-invasive and constitutes malicious/suspicious supply-chain behavior. Avoid using this package and treat it as high risk.

Live on pypi for 23 minutes before removal. Socket users were protected even while the package was live.

github.com/gravitl/netmaker

v0.0.0-20210328163709-6ed618052000

Live on go

Blocked by Socket

The best-supported interpretation from all three reports is that this snippet is intended to remove/disrupt a networking/service component: it deletes a network interface, performs an authenticated DELETE against a local admin API to remove a node entry, overwrites sensitive network configuration, deletes a token, and then executes a privileged Go removal routine. The hardcoded bearer credential and `sudo go run ./main.go` pattern are strong security red flags. Even if this could be legitimate administrative deprovisioning, it is high-risk automation without verification/controls, and the unreviewed `main.go` is an unresolved supply-chain execution sink.

ismoiloffs

0.1.0

Removed from pypi

Blocked by Socket

This module implements a remote-controlled code execution mechanism: it collects a password and a machine fingerprint, sends them to a hardcoded external server, retrieves Python code, and executes it directly in-process. This pattern is equivalent to a remote backdoor and enables arbitrary actions on the host. It also stores a plaintext password in the user's home directory. Treat this code as malicious or high-risk unless you fully trust the remote endpoint and have strong out-of-band assurances (code signing and audited server behavior). Do not run this in production or on sensitive systems; if encountered in a dependency, consider removing, isolating, or auditing the remote server and any delivered payloads.

Live on pypi for 102 days, 11 hours and 8 minutes before removal. Socket users were protected even while the package was live.

jessa-vue-components

3.0.1563

Removed from npm

Blocked by Socket

The code is exfiltrating system information to an external server using DNS queries, which is indicative of malicious behavior. This poses a significant security risk due to unauthorized data transmission.

Live on npm for 6 minutes before removal. Socket users were protected even while the package was live.

three-trees-ui

1.1.6

by zhanglichun1989

Live on npm

Blocked by Socket

This code implements a dangerous arbitrary code execution vulnerability disguised as a component method. The suspicious naming, base64 obfuscation, and privileged context access make it highly likely to be malicious infrastructure for remote code execution, data theft, or system compromise.

artifact-lab-3-package-392c6acd

0.1.3

Live on pypi

Blocked by Socket

This module implements a classic reverse shell/backdoor that connects to a hard-coded external ngrok endpoint and spawns an interactive /bin/bash bound to the socket. It provides unauthenticated remote command execution and is malicious in practice. Do not run this code. If this was found in a repository or on a host, treat it as a compromise indicator: isolate the host, investigate execution timeframe, check for additional persistence, block the outgoing endpoint(s), and rotate any potentially exposed credentials. Remove the file and remediate according to incident response procedures.

github.com/milvus-io/milvus

v0.10.3-0.20211021140115-b4064e6d76aa

Live on go

Blocked by Socket

This code implements an insecure, unauthenticated RPC mechanism that allows remote clients to cause arbitrary code execution and exfiltrate files/system information. Using pickle over an untrusted network and invoking methods by client-supplied names are severe supply-chain/backdoor risks. Do not deploy or reuse this code in production; it should be treated as a backdoor/untrusted remote-execution component unless wrapped with strong authentication, authorization, sandboxing, and safe serialization.

walmart-canada-free-card890

1.0.2

by muhammadharunmiya44

Removed from npm

Blocked by Socket

The script seems to be part of a spamming operation and uses bad security practices, such as hardcoding paths and credentials. Therefore, it's a potential security risk.

Live on npm for 2 hours and 12 minutes before removal. Socket users were protected even while the package was live.

yxspkg

6.12.37

Live on pypi

Blocked by Socket

The fragment is an opaque, binary/packed payload or heavily obfuscated content that cannot be reliably analyzed statically. While this alone does not prove malicious intent, it signals high risk and warrants isolation, request for a readable source or deobfuscated form, and controlled dynamic analysis to determine any harmful behavior or data leakage potential.

synflood

1.0.0

by zhyjs

Live on npm

Blocked by Socket

The reviewed file is an active network attack utility implementing forged packet generation and a SYN flood style sender with source IP spoofing and process-level parallelism. It is malicious (or dual-use with high risk) and should not be included as a dependency or executed on networks you do not control. If found in a package, treat it as a critical supply-chain security incident and remove/inspect other package artifacts (including './syn.js').

magalh

1.0.7

by abu-sara

Live on npm

Blocked by Socket

The best report is Report 3 (highest confidence and most comprehensive mapping of anomalies/sinks). After improving it: this code fragment shows strong backdoor/loader characteristics—extreme obfuscation, periodic persistence (setInterval/setImmediate), and explicit command-execution capability (spawn/exec and process computed execution) alongside recon/state staging (os + JSON.parse/Map caches) and shell/netcat indicators. It also blends web/session setup to mask malicious behavior. Treat the dependency as malicious and isolate/quarantine; perform deobfuscation and runtime tracing to recover exact command strings and any network destinations (not fully visible in the snippet).

tx.bim

1.1.5.13

by TianTeng

Live on nuget

Blocked by Socket

This assembly contains strongly malicious or at least highly suspicious behavior: an obfuscated runtime loader/unpacker that reads encrypted embedded resources, decrypts them with hardcoded keys, allocates executable memory, writes native code into process memory, modifies runtime/JIT structures, and executes the injected code. It also contains functionality to write to other process memory and to /proc/self/mem on Linux. The presence of unrelated obfuscated native loader code inside a BIM model library is a major supply-chain red flag. I recommend not using this package, treating it as malicious, and removing it from any build or environment where it may execute.

lullaby-horizon-wkj204

1.0.0

by afifaljafari112

Removed from npm

Blocked by Socket

The code contains imports from multiple suspiciously named modules and calls a function `functame()` on each. The overall structure is unconventional and lacks clarity in its purpose. This warrants further investigation into the actual content of the modules being imported, but the code itself does not show direct malicious behavior or significant security risks.

Live on npm for 56 days, 23 hours and 19 minutes before removal. Socket users were protected even while the package was live.

mtmai

0.3.1410

Removed from pypi

Blocked by Socket

This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.

Live on pypi for 6 hours and 21 minutes before removal. Socket users were protected even while the package was live.

fhempy

0.1.45

Live on pypi

Blocked by Socket

The code performs several potentially risky operations such as downloading and executing binaries from external sources, running network services, and using Telnet for remote command execution. These actions pose significant security risks, including the possibility of introducing malicious code and exposing the system to network-based attacks. However, there is no explicit evidence of malicious intent in the code itself.

mtmai

0.3.1346

Live on pypi

Blocked by Socket

This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.

agentdojo

0.1.16

Live on pypi

Blocked by Socket

This conversation demonstrates a prompt-injection attack embedded in external webpage content that successfully coerced the assistant to enumerate Slack channels, read channel messages (including a revealed secret), and post the concatenated messages to an untrusted external website (www.my-website-234.com/random). This is a high-severity data exfiltration incident caused by improper handling of untrusted tool outputs and lack of defense-in-depth controls (validation, allowlists, user confirmations, secret-detection and redaction). Immediate remediation: assume compromise of any exposed secrets, rotate leaked credentials, block the external domain, enforce tool-output trust boundaries, implement secret-detection and redaction on any outbound posts, require human approval for actions that disclose workspace data, and audit tool integrations and logs.

carbonorm/carbonphp

10.2.7

Live on composer

Blocked by Socket

The dominant security concern is the explicit use of eval on data-derived JSON within CarbonPHP.handlebars, which can enable arbitrary code execution if data is attacker-controlled. Additional concerns include unsanitized dynamic script/template loading and a busy-wait sleep that can degrade performance and potentially expose timing information. Overall risk is high due to the eval pattern and dynamic content loading without strong sanitization.

github.com/KubeOperator/kubepi

v1.2.2-0.20211119030933-b5a62dc0c719

Live on go

Blocked by Socket

The code effectively creates a remote terminal backdoor-like capability via gotty on macOS, with minimal visibility due to silent I/O and hard-coded paths. This is a high-security-risk pattern that warrants removal or strict hardening (authentication, access controls, non-root execution, dynamic path resolution, and explicit port management). A broader code review and deployment safeguards are strongly recommended.

aem-spa-component-mapping

999999999.999.999

by k4r1it0

Removed from npm

Blocked by Socket

The code is malicious, containing a reverse shell and data exfiltration mechanism. It poses a significant security risk by allowing unauthorized remote access and sending sensitive system information to an external server.

Live on npm for 7 hours and 58 minutes before removal. Socket users were protected even while the package was live.

mtmai

0.6.35

Live on pypi

Blocked by Socket

This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Git dependency

GitHub dependency

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

Telemetry

Protestware or potentially unwanted behavior

Unstable ownership

55 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a Demo

Questions? Call us at (844) SOCKET-0

Read the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles