Launch Week Day 5: Introducing Reachability for PHP.Learn More
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.5

We protect you from vulnerable and malicious packages

qg-toolkit

1.0.15

Live on pypi

Blocked by Socket

The script collects sensitive user information from the Discord API, including usernames, emails, and IDs, and saves it to a file without user consent. It automates interactions with Discord, including sending unsolicited messages to channels (spamming), and uses a captcha solving service to bypass security measures. The script contains hardcoded API keys and tokens, posing significant security risks if shared or leaked. Additionally, it includes obfuscated JavaScript code to manipulate local storage tokens, suggesting attempts to hijack or misuse user accounts.

rfmux

1.4.1

Live on pypi

Blocked by Socket

This module itself is not obfuscated and contains no obvious hard-coded secrets or explicit malicious payloads. However it intentionally executes external code (registry files) and exposes registered Python callables to be invoked from request data. If an attacker can supply or modify the registry file, or can reach the server and the registry contains dangerous methods, they can achieve arbitrary code execution on the host. Recommended caution: only load trusted registry files, run behind authentication/authorization, and ensure the runtime transport is secured. For untrusted environments, treat this as high-risk functionality.

tiny-model-update

1.16.7

Live on npm

Blocked by Socket

This module is an automation tool that, given Discord user tokens, enumerates servers, creates permanent invite links when necessary, and sends those invite links plus guild names to an external Telegram endpoint. The functionality enables exfiltration and unauthorized propagation into servers and could be used to escalate or distribute malicious campaigns. The code contains clear misuse patterns (credential abuse, creation of durable invites, external exfiltration) and is highly suspicious. Treat as malicious tooling — do not run with real tokens; remove and investigate any exposure of tokens.

vuln-app

1.4.0

by sudosnail42

Removed from npm

Blocked by Socket

The source code contains a high-risk malicious behavior by executing a shell command to send a network request to a suspicious external server without user consent. This is indicative of malware activity such as data exfiltration or beaconing. The code is not obfuscated but poses a serious security risk and should be considered malicious.

Live on npm for 1 hour and 14 minutes before removal. Socket users were protected even while the package was live.

vigilinux

0.22.0

Removed from pypi

Blocked by Socket

This module is not explicitly obfuscated or directly embedding malware, but it presents a high-risk pattern: it executes AI-generated shell commands with shell=True and no safety enforcement. The imported safety check (is_command_safe) is not used. That design allows arbitrary command execution, privilege escalation suggestions, and automated retries — all of which could be abused to run destructive or exfiltrative operations. Fixes should include enforcing command safety checks, prompting the user for explicit approval before executing AI-generated commands, avoiding shell=True where possible, limiting retries, and validating the API key usage bug. Treat this package as high-risk for runtime command execution until mitigations are added.

Live on pypi for 6 hours and 13 minutes before removal. Socket users were protected even while the package was live.

ailever

0.3.48

Live on pypi

Blocked by Socket

The code presents a strong supply-chain and remote-execution risk by automatically downloading and executing remote Python payloads without integrity checks or sandboxing. It also creates and runs external services (Jupyter, Visdom, RStudio) based on user inputs, which can amplify impact if the remote payload is malicious. Mitigations include removing remote code execution paths, adding cryptographic verification (signatures or hash checks), isolating execution (sandboxes or containerization), validating inputs, and avoiding untrusted downloads or executions.

aardium-win32-x64

2.1.0

by Aardvark Platform Team

Live on nuget

Blocked by Socket

This code fragment implements a remote-control server for an Electron app with the ability to execute arbitrary JavaScript supplied by a remote command (new Function(cmd.js)), capture and transmit full window bitmaps, inject input events, open external URLs, and manipulate the window. Absent strong authentication and strict input validation, this is effectively a backdoor and presents a high supply-chain / runtime risk (data exfiltration and full remote code execution). If this behavior is not explicitly required and properly secured by the application, treat the package as unsafe.

aurora-biologic

0.2.5

Live on pypi

Blocked by Socket

The code implements a localhost-only command execution daemon with minimal input validation and no authentication. It permits arbitrary shell execution of any command provided by a local process, which constitutes a serious remote-command execution risk and potential data leakage. The design resembles a backdoor component if exposed beyond localhost. Strong recommendations include removing the daemon, or replacing it with a tightly controlled, sandboxed interface (explicit commands, strict input validation, authentication, and no shell=True). If kept for isolation, place behind proper access controls, TLS or local IPC, and principle of least privilege.

instant-python

0.9.1

Live on pypi

Blocked by Socket

This templated script contains a high-severity command-injection vulnerability: it interpolates unsanitized user input into a shell command string executed with subprocess.run(..., shell=True). There is no evidence of deliberate malware or exfiltration in the snippet, but the insecure pattern allows arbitrary command execution and therefore poses a serious security risk. Remediation should prioritize removing shell=True by using argument lists or strict input validation/quoting before any use in a shell.

github.com/sourcegraph/sourcegraph

v0.0.0-20210617140145-d2e45d0488ac

Live on go

Blocked by Socket

This module is a purpose-built destructive utility: given a user-supplied directory, it enumerates all files ending in .zip and corrupts them by truncating them to half their size and appending deterministic junk data. The absence of safeguards (dry-run/confirmation/allowlists) and the deliberate sabotage operations make this strongly indicative of malicious intent within a supply-chain context, even though it does not show typical malware capabilities like networking or data exfiltration.

tea-zowie-gadzooks

1.0.0

by skartas

Removed from npm

Blocked by Socket

The file itself is not obviously obfuscated or containing inline exfiltration code, but it exhibits high supply-chain and credential-harvesting risk: it solicits a password and immediately forwards it (with a hard-coded username) to third-party modules, while requiring many suspiciously named packages at import-time that may execute arbitrary code. Treat this as unsafe until the provenance and source code of every required package (especially 'twt-playground', 'xauth-login', and the numerous 'x-*' packages) are audited and verified. Do not run this code in production or on sensitive systems without such verification.

Live on npm for 2 hours and 21 minutes before removal. Socket users were protected even while the package was live.

tensorflowlitex

0.1.7

Live on pypi

Blocked by Socket

This module implements a high-risk remote code execution pattern: it downloads an executable from a hardcoded remote GitHub URL into a temp directory and executes it silently without any integrity checks or user consent. The filename obfuscation, suppressed IO, and hidden/detached execution are strong indicators of covert behavior. Treat this code as malicious or at minimum unacceptable for production use until the remote binary and its maintainer are validated and cryptographic verification is added.

mr_nima_news_bot

0.0.9

by nimeshmadusanka

Live on npm

Blocked by Socket

This code fragment is highly consistent with a malicious backdoor/remote command execution module: it exports a command runner, parses command-like input, executes dynamically constructed code via eval, dynamically loads execution primitives via require with computed module specifiers, and returns command results/errors to a caller-provided channel. Treat the package/module as hostile and do not use it without full quarantine and removal; inspect for additional persistence/network entrypoints in the full package.

coone-annotation-tool

0.1.102

by mede

Live on npm

Blocked by Socket

The package contains a hidden payload that targets Russian language users visiting Russian and Belarusian sites. For those users, it will disable user interaction and play a looping audio of the Ukrainian anthem after 3 days. Therefore, it is marked as protestware only because it freezes interactions for many users. This behavior is not disclosed in any documentation of the package and seriously disrupts user experience.

idlem

0.0.4

Live on pypi

Blocked by Socket

The source code is primarily focused on managing a cryptocurrency mining operation, which can be considered malicious if performed without explicit user consent. The use of Docker and monitoring of system resources and user logins are key components of this operation.

muaddib-scanner

2.2.18

by dnszlsk

Live on npm

Blocked by Socket

This code collects the entire process environment, lightly obfuscates it by triple base64 encoding, and uploads it as a public GitHub Gist, optionally authenticating with any present GITHUB_TOKEN. This is direct, high-impact data exfiltration of potentially sensitive secrets and should be considered malicious/backdoor behavior. Do not run this code; treat any environment where it executed as compromised and rotate exposed credentials.

vlabs-buildexp

2.7.4

by shreyash1002

Live on npm

Blocked by Socket

This code fragment is a high-risk build pipeline component. It (1) executes configuration-controlled shell commands via shell.exec using plugin.command and a runtime argument, creating a strong path to arbitrary command execution if inputs are not tightly controlled; and (2) injects configuration-controlled ES module and stylesheet URLs into a generated DOM that is serialized and written to disk, enabling malicious code delivery/execution when the produced artifact is loaded. No obvious obfuscation or explicit stealer payload is visible in the snippet, but the capabilities align with common supply-chain compromise patterns.

cl-lite

1.0.1010

by michael_tian

Live on npm

Blocked by Socket

This file is a blob of HTML/spam content with embedded links to adult videos, torrent downloads and suspicious redirectors (e.g. https://2023[.]redircdn[.]com/?…, http://rmdown[.]com/link[.]php?hash=…, http://data[.]down2048[.]com/list[.]php?…), plus numerous third-party image URLs. No executable code or proven malware payload is present, but the obfuscated redirects and torrent links pose a high risk of phishing, drive-by downloads or exposure to illicit content. Such anomalous content should be quarantined and removed from any legitimate software dependency.

ailever

0.3.139

Live on pypi

Blocked by Socket

The fragment contains a high-risk pattern: it downloads a Python script from a remote source and immediately executes it without integrity verification or sandboxing. This creates a critical supply-chain and remote-code-execution risk, as the remote payload could perform any action on the host, including data exfiltration, credential access, or system compromise. Even though defaults use placeholders, the mechanism itself is unsafe and should be disallowed or hardened (e.g., verify hashes, use signed modules, avoid executing remote code).

ether-lint

5.9.1

Live on npm

Blocked by Socket

This file exhibits multiple high-risk behaviors: heavy obfuscation, runtime decoding, global console method replacement (anti-analysis), assembly of remote URLs, and immediate execution of platform-specific shell commands via execSync. Treat this module as malicious or severely compromised. Do not run or include it in your supply chain; remove and investigate dependent packages. If you must analyze further, perform isolated sandboxed dynamic analysis and fully deobfuscate decoded command strings before any execution.

argus-redteam

0.2.2

Live on pypi

Blocked by Socket

This module is a security-sensitive, adversarial capability component. It deterministically generates “maladaptive” deferred payload and trigger descriptions consistent with offensive tactics (exfiltration/escalation/injection-like concepts) and optionally uses an external LLM to generate conditioning strategies and deferred payload/trigger JSON that is embedded into the genome. While it does not execute payloads in this file, it meaningfully prepares attack-like instructions and can disclose internal telemetry/conditioning state to a third-party LLM when enabled. Treat it as suspicious and review downstream interpretation and data-sensitivity of genome fields before use.

oss-site-jekyll-theme

99.10.10

Removed from npm

Blocked by Socket

The code engages in potentially malicious behavior by collecting sensitive system information and sending it to a remote server without clear user consent. The hard-coded domain, data obfuscation, and lack of transparency raise significant privacy and security concerns. The risk score is high due to the invasive nature of the code.

Live on npm for 39 minutes before removal. Socket users were protected even while the package was live.

cypherit

0.0.2

Live on pypi

Blocked by Socket

This module is malicious: it implements a ransomware-like workflow that collects local files and hostname, exfiltrates them to a remote server, deletes local originals, and writes defacement files. It uses unsafe serialization/deserialization (str()/ast.literal_eval()), unescaped shell commands (os.system with attacker-controlled values), and plaintext network transfer. Do not execute this code; treat it as high-risk malware and remove from any production environment. For forensic review run only in isolated sandbox.

old-celo-identity

1.0.0

by cyberexploit

Removed from npm

Blocked by Socket

This code gathers sensitive system and user information (e.g., home directory, hostname, username, DNS servers, and package metadata) without user consent and sends it via an HTTPS POST request to lrg2v0x016cebj405fh4lf62ftll9fx4[.]oastify[.]com. The domain is not associated with any known legitimate service and may be used for data exfiltration or other malicious purposes, posing a significant security risk.

Live on npm for 30 days, 8 hours and 37 minutes before removal. Socket users were protected even while the package was live.

github.com/bishopfox/sliver

v1.5.40-0.20240919144059-e4027d6373f6

Live on go

Blocked by Socket

The code presents clear indicators of malicious capability: in-process shellcode execution and memfd-based side-loading with LD_PRELOAD to run injected data in another process. This constitutes high-risk behavior suitable for backdoor or code execution tooling. The implementation lacks input validation, safeguards, or auditing hooks, making it a strong threat in supply-chain contexts. Hardening would require removing in-memory code execution, eliminating LD_PRELOAD-based injection paths, and adding strict input validation, provenance checks, and runtime protections.

qg-toolkit

1.0.15

Live on pypi

Blocked by Socket

The script collects sensitive user information from the Discord API, including usernames, emails, and IDs, and saves it to a file without user consent. It automates interactions with Discord, including sending unsolicited messages to channels (spamming), and uses a captcha solving service to bypass security measures. The script contains hardcoded API keys and tokens, posing significant security risks if shared or leaked. Additionally, it includes obfuscated JavaScript code to manipulate local storage tokens, suggesting attempts to hijack or misuse user accounts.

rfmux

1.4.1

Live on pypi

Blocked by Socket

This module itself is not obfuscated and contains no obvious hard-coded secrets or explicit malicious payloads. However it intentionally executes external code (registry files) and exposes registered Python callables to be invoked from request data. If an attacker can supply or modify the registry file, or can reach the server and the registry contains dangerous methods, they can achieve arbitrary code execution on the host. Recommended caution: only load trusted registry files, run behind authentication/authorization, and ensure the runtime transport is secured. For untrusted environments, treat this as high-risk functionality.

tiny-model-update

1.16.7

Live on npm

Blocked by Socket

This module is an automation tool that, given Discord user tokens, enumerates servers, creates permanent invite links when necessary, and sends those invite links plus guild names to an external Telegram endpoint. The functionality enables exfiltration and unauthorized propagation into servers and could be used to escalate or distribute malicious campaigns. The code contains clear misuse patterns (credential abuse, creation of durable invites, external exfiltration) and is highly suspicious. Treat as malicious tooling — do not run with real tokens; remove and investigate any exposure of tokens.

vuln-app

1.4.0

by sudosnail42

Removed from npm

Blocked by Socket

The source code contains a high-risk malicious behavior by executing a shell command to send a network request to a suspicious external server without user consent. This is indicative of malware activity such as data exfiltration or beaconing. The code is not obfuscated but poses a serious security risk and should be considered malicious.

Live on npm for 1 hour and 14 minutes before removal. Socket users were protected even while the package was live.

vigilinux

0.22.0

Removed from pypi

Blocked by Socket

This module is not explicitly obfuscated or directly embedding malware, but it presents a high-risk pattern: it executes AI-generated shell commands with shell=True and no safety enforcement. The imported safety check (is_command_safe) is not used. That design allows arbitrary command execution, privilege escalation suggestions, and automated retries — all of which could be abused to run destructive or exfiltrative operations. Fixes should include enforcing command safety checks, prompting the user for explicit approval before executing AI-generated commands, avoiding shell=True where possible, limiting retries, and validating the API key usage bug. Treat this package as high-risk for runtime command execution until mitigations are added.

Live on pypi for 6 hours and 13 minutes before removal. Socket users were protected even while the package was live.

ailever

0.3.48

Live on pypi

Blocked by Socket

The code presents a strong supply-chain and remote-execution risk by automatically downloading and executing remote Python payloads without integrity checks or sandboxing. It also creates and runs external services (Jupyter, Visdom, RStudio) based on user inputs, which can amplify impact if the remote payload is malicious. Mitigations include removing remote code execution paths, adding cryptographic verification (signatures or hash checks), isolating execution (sandboxes or containerization), validating inputs, and avoiding untrusted downloads or executions.

aardium-win32-x64

2.1.0

by Aardvark Platform Team

Live on nuget

Blocked by Socket

This code fragment implements a remote-control server for an Electron app with the ability to execute arbitrary JavaScript supplied by a remote command (new Function(cmd.js)), capture and transmit full window bitmaps, inject input events, open external URLs, and manipulate the window. Absent strong authentication and strict input validation, this is effectively a backdoor and presents a high supply-chain / runtime risk (data exfiltration and full remote code execution). If this behavior is not explicitly required and properly secured by the application, treat the package as unsafe.

aurora-biologic

0.2.5

Live on pypi

Blocked by Socket

The code implements a localhost-only command execution daemon with minimal input validation and no authentication. It permits arbitrary shell execution of any command provided by a local process, which constitutes a serious remote-command execution risk and potential data leakage. The design resembles a backdoor component if exposed beyond localhost. Strong recommendations include removing the daemon, or replacing it with a tightly controlled, sandboxed interface (explicit commands, strict input validation, authentication, and no shell=True). If kept for isolation, place behind proper access controls, TLS or local IPC, and principle of least privilege.

instant-python

0.9.1

Live on pypi

Blocked by Socket

This templated script contains a high-severity command-injection vulnerability: it interpolates unsanitized user input into a shell command string executed with subprocess.run(..., shell=True). There is no evidence of deliberate malware or exfiltration in the snippet, but the insecure pattern allows arbitrary command execution and therefore poses a serious security risk. Remediation should prioritize removing shell=True by using argument lists or strict input validation/quoting before any use in a shell.

github.com/sourcegraph/sourcegraph

v0.0.0-20210617140145-d2e45d0488ac

Live on go

Blocked by Socket

This module is a purpose-built destructive utility: given a user-supplied directory, it enumerates all files ending in .zip and corrupts them by truncating them to half their size and appending deterministic junk data. The absence of safeguards (dry-run/confirmation/allowlists) and the deliberate sabotage operations make this strongly indicative of malicious intent within a supply-chain context, even though it does not show typical malware capabilities like networking or data exfiltration.

tea-zowie-gadzooks

1.0.0

by skartas

Removed from npm

Blocked by Socket

The file itself is not obviously obfuscated or containing inline exfiltration code, but it exhibits high supply-chain and credential-harvesting risk: it solicits a password and immediately forwards it (with a hard-coded username) to third-party modules, while requiring many suspiciously named packages at import-time that may execute arbitrary code. Treat this as unsafe until the provenance and source code of every required package (especially 'twt-playground', 'xauth-login', and the numerous 'x-*' packages) are audited and verified. Do not run this code in production or on sensitive systems without such verification.

Live on npm for 2 hours and 21 minutes before removal. Socket users were protected even while the package was live.

tensorflowlitex

0.1.7

Live on pypi

Blocked by Socket

This module implements a high-risk remote code execution pattern: it downloads an executable from a hardcoded remote GitHub URL into a temp directory and executes it silently without any integrity checks or user consent. The filename obfuscation, suppressed IO, and hidden/detached execution are strong indicators of covert behavior. Treat this code as malicious or at minimum unacceptable for production use until the remote binary and its maintainer are validated and cryptographic verification is added.

mr_nima_news_bot

0.0.9

by nimeshmadusanka

Live on npm

Blocked by Socket

This code fragment is highly consistent with a malicious backdoor/remote command execution module: it exports a command runner, parses command-like input, executes dynamically constructed code via eval, dynamically loads execution primitives via require with computed module specifiers, and returns command results/errors to a caller-provided channel. Treat the package/module as hostile and do not use it without full quarantine and removal; inspect for additional persistence/network entrypoints in the full package.

coone-annotation-tool

0.1.102

by mede

Live on npm

Blocked by Socket

The package contains a hidden payload that targets Russian language users visiting Russian and Belarusian sites. For those users, it will disable user interaction and play a looping audio of the Ukrainian anthem after 3 days. Therefore, it is marked as protestware only because it freezes interactions for many users. This behavior is not disclosed in any documentation of the package and seriously disrupts user experience.

idlem

0.0.4

Live on pypi

Blocked by Socket

The source code is primarily focused on managing a cryptocurrency mining operation, which can be considered malicious if performed without explicit user consent. The use of Docker and monitoring of system resources and user logins are key components of this operation.

muaddib-scanner

2.2.18

by dnszlsk

Live on npm

Blocked by Socket

This code collects the entire process environment, lightly obfuscates it by triple base64 encoding, and uploads it as a public GitHub Gist, optionally authenticating with any present GITHUB_TOKEN. This is direct, high-impact data exfiltration of potentially sensitive secrets and should be considered malicious/backdoor behavior. Do not run this code; treat any environment where it executed as compromised and rotate exposed credentials.

vlabs-buildexp

2.7.4

by shreyash1002

Live on npm

Blocked by Socket

This code fragment is a high-risk build pipeline component. It (1) executes configuration-controlled shell commands via shell.exec using plugin.command and a runtime argument, creating a strong path to arbitrary command execution if inputs are not tightly controlled; and (2) injects configuration-controlled ES module and stylesheet URLs into a generated DOM that is serialized and written to disk, enabling malicious code delivery/execution when the produced artifact is loaded. No obvious obfuscation or explicit stealer payload is visible in the snippet, but the capabilities align with common supply-chain compromise patterns.

cl-lite

1.0.1010

by michael_tian

Live on npm

Blocked by Socket

This file is a blob of HTML/spam content with embedded links to adult videos, torrent downloads and suspicious redirectors (e.g. https://2023[.]redircdn[.]com/?…, http://rmdown[.]com/link[.]php?hash=…, http://data[.]down2048[.]com/list[.]php?…), plus numerous third-party image URLs. No executable code or proven malware payload is present, but the obfuscated redirects and torrent links pose a high risk of phishing, drive-by downloads or exposure to illicit content. Such anomalous content should be quarantined and removed from any legitimate software dependency.

ailever

0.3.139

Live on pypi

Blocked by Socket

The fragment contains a high-risk pattern: it downloads a Python script from a remote source and immediately executes it without integrity verification or sandboxing. This creates a critical supply-chain and remote-code-execution risk, as the remote payload could perform any action on the host, including data exfiltration, credential access, or system compromise. Even though defaults use placeholders, the mechanism itself is unsafe and should be disallowed or hardened (e.g., verify hashes, use signed modules, avoid executing remote code).

ether-lint

5.9.1

Live on npm

Blocked by Socket

This file exhibits multiple high-risk behaviors: heavy obfuscation, runtime decoding, global console method replacement (anti-analysis), assembly of remote URLs, and immediate execution of platform-specific shell commands via execSync. Treat this module as malicious or severely compromised. Do not run or include it in your supply chain; remove and investigate dependent packages. If you must analyze further, perform isolated sandboxed dynamic analysis and fully deobfuscate decoded command strings before any execution.

argus-redteam

0.2.2

Live on pypi

Blocked by Socket

This module is a security-sensitive, adversarial capability component. It deterministically generates “maladaptive” deferred payload and trigger descriptions consistent with offensive tactics (exfiltration/escalation/injection-like concepts) and optionally uses an external LLM to generate conditioning strategies and deferred payload/trigger JSON that is embedded into the genome. While it does not execute payloads in this file, it meaningfully prepares attack-like instructions and can disclose internal telemetry/conditioning state to a third-party LLM when enabled. Treat it as suspicious and review downstream interpretation and data-sensitivity of genome fields before use.

oss-site-jekyll-theme

99.10.10

Removed from npm

Blocked by Socket

The code engages in potentially malicious behavior by collecting sensitive system information and sending it to a remote server without clear user consent. The hard-coded domain, data obfuscation, and lack of transparency raise significant privacy and security concerns. The risk score is high due to the invasive nature of the code.

Live on npm for 39 minutes before removal. Socket users were protected even while the package was live.

cypherit

0.0.2

Live on pypi

Blocked by Socket

This module is malicious: it implements a ransomware-like workflow that collects local files and hostname, exfiltrates them to a remote server, deletes local originals, and writes defacement files. It uses unsafe serialization/deserialization (str()/ast.literal_eval()), unescaped shell commands (os.system with attacker-controlled values), and plaintext network transfer. Do not execute this code; treat it as high-risk malware and remove from any production environment. For forensic review run only in isolated sandbox.

old-celo-identity

1.0.0

by cyberexploit

Removed from npm

Blocked by Socket

This code gathers sensitive system and user information (e.g., home directory, hostname, username, DNS servers, and package metadata) without user consent and sends it via an HTTPS POST request to lrg2v0x016cebj405fh4lf62ftll9fx4[.]oastify[.]com. The domain is not associated with any known legitimate service and may be used for data exfiltration or other malicious purposes, posing a significant security risk.

Live on npm for 30 days, 8 hours and 37 minutes before removal. Socket users were protected even while the package was live.

github.com/bishopfox/sliver

v1.5.40-0.20240919144059-e4027d6373f6

Live on go

Blocked by Socket

The code presents clear indicators of malicious capability: in-process shellcode execution and memfd-based side-loading with LD_PRELOAD to run injected data in another process. This constitutes high-risk behavior suitable for backdoor or code execution tooling. The implementation lacks input validation, safeguards, or auditing hooks, making it a strong threat in supply-chain contexts. Hardening would require removing in-memory code execution, eliminating LD_PRELOAD-based injection paths, and adding strict input validation, provenance checks, and runtime protections.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Git dependency

GitHub dependency

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

Telemetry

Protestware or potentially unwanted behavior

Unstable ownership

55 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a Demo

Questions? Call us at (844) SOCKET-0

Read the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles