🚀 Big News:Socket Has Acquired Secure Annex.Learn More
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.5

We protect you from vulnerable and malicious packages

forthres-audit

1.0.5

by staffing-hexora

Live on npm

Blocked by Socket

This module is a highly offensive, exploitation-capable scanning/attack-chaining engine. It sends crafted payloads for LFI/SQLi/XSS/SSRF/auth bypass/JWT attacks, attempts request smuggling and timing enumeration, captures/extracts cookies/tokens from responses and reuses them for further attacks, and can trigger post-exploitation/exfiltration/lateral-movement/credential-harvesting components. It also disables TLS verification (verify=False) and may log sensitive evidence/payloads. Overall, it presents a very high security risk consistent with malicious capability if used outside a tightly controlled authorized red-team environment.

mindfabric-agent

1.1.356

Live on pypi

Blocked by Socket

This code is a high-risk credential/secret-harvesting component: it performs an authenticated LDAP query against Active Directory to retrieve Microsoft LAPS local administrator passwords (ms-Mcs-AdmPwd), parses them, and returns the plaintext passwords to the caller. While the fragment includes a likely typo (`return resul`) that may prevent successful completion at runtime, the core functionality is explicitly designed for LAPS password dumping, making the overall security risk extremely high in any supply-chain context.

mindfabric-agent

1.1.356

Live on pypi

Blocked by Socket

This module is strongly indicative of offensive Active Directory credential dumping: it invokes secretsdump.py with DC/DCSync-style flags, parses secretsdump output for LM/NT hashes, and returns recovered password material. Additionally, it executes a constructed shell command with allow_unsafe_shell=True using user-supplied parameters, creating a command-injection and sensitive-data exposure risk. A likely return-variable typo may affect runtime behavior, but the suspicious intent and high-risk sink are present in the executed logic.

timermcp

1.0.0

Live on pypi

Blocked by Socket

This fragment is a high-confidence malicious loader/dropper: it downloads arbitrary Python code from a hardcoded remote IP over unencrypted HTTP, writes it to the local temp directory as launcher.py, and executes it using pythonw.exe with no visible window. The absence of integrity/authenticity checks and the stealthy execution strongly indicate malware staging behavior rather than legitimate functionality.

@link-assistant/hive-mind

1.64.0

by GitHub Actions

Live on npm

Blocked by Socket

This module exhibits a critical supply-chain execution risk: if globalThis.use is not already defined, it fetches JavaScript from an external CDN (unpkg) at runtime and executes it via eval(), then uses the result to access fs and read arbitrary caller-specified files. Even if the outward behavior is to post issue/PR comments, the eval(fetch(...).text()) primitive is sufficient for arbitrary code execution, making the package unsafe unless the remote content is tightly controlled/pinned and the runtime behavior is otherwise proven benign.

convexity-sdk

0.12.0

Live on pypi

Blocked by Socket

This module is strongly aligned with credential/environment harvesting behavior: it hardcodes a secret (API_KEY), injects it into a remote environment, and then explicitly prints secret values and executed-cell outputs intended to reveal environment variables. Cleanup is incomplete (only LOG_LEVEL and the session are removed in the shown fragment). While it does not show covert network exfiltration or typical malware mechanics, the design and logging create a high likelihood of sensitive credential disclosure in operator/CI logs and via remote execution outputs. Treat as unsafe until CELL_CODE and surrounding context are fully reviewed and all injected secrets are safely redacted and removed.

@lanmower/foph

0.0.36

by lanmower

Live on npm

Blocked by Socket

This module exposes an interactive, long-lived OS shell controlled by caller-supplied inputs (sh/cmd spawn, direct stdin injection, and stdout/stderr return). It functions as a backdoor-like command execution interface if reachable by untrusted callers, and it also passes the full parent environment to the shell, increasing secret exposure risk. Strong isolation and strict authentication/authorization at a higher layer are required, but are not present in this snippet.

modern-hta

7.29.3

by joncasey

Live on npm

Blocked by Socket

This module is highly suspicious and likely malicious in intent: it embeds an IE/HTA loader that can synchronously fetch arbitrary text/code via ActiveX (including local/relative paths), then executes that content using Function and/or eval, plus it can execute embedded script.text on DOMContentLoaded. The fetch/Headers/Request/Response polyfill appears to be ancillary or decoy relative to the dynamic execution and ActiveX staging primitives.

scrybe-cli

0.28.1

by siaarzh

Live on npm

Blocked by Socket

This module’s primary behavior is installing and removing a macOS LaunchAgent by writing a plist to ~/Library/LaunchAgents and enabling/disabling it with launchctl bootstrap/bootout. It creates an autostart execution pipeline (RunAtLoad=true) where the executed command is supplied by writeLauncherScript() from ./shared.js and embedded into ProgramArguments without escaping. While this fragment shows no direct data theft or networking, the persistence/autostart design is commonly associated with malware, so the overall package behavior should be treated as high risk until the generated launcherScript and MARKER_PLIST_ID are reviewed.

mindfabric-agent

1.1.356

Live on pypi

Blocked by Socket

This module generates and returns runnable command templates and structured “blind spot” guidance that include explicit malware drop/execute and reverse-shell invocation, along with explicit SIEM-evasion framing via excluded paths/process names. It also embeds offensive payload delivery/credential-tooling example commands. Additionally, it interpolates untrusted parameters directly into executable command strings without validation. Overall, the code presents strong malicious/sabotage intent and should not be used as a general dependency without strict isolation and review; treat as a critical supply-chain security risk.

convexity-sdk

0.12.0.dev229

Live on pypi

Blocked by Socket

This module is strongly aligned with credential/environment harvesting behavior: it hardcodes a secret (API_KEY), injects it into a remote environment, and then explicitly prints secret values and executed-cell outputs intended to reveal environment variables. Cleanup is incomplete (only LOG_LEVEL and the session are removed in the shown fragment). While it does not show covert network exfiltration or typical malware mechanics, the design and logging create a high likelihood of sensitive credential disclosure in operator/CI logs and via remote execution outputs. Treat as unsafe until CELL_CODE and surrounding context are fully reviewed and all injected secrets are safely redacted and removed.

guanlan

0.2.3

Live on pypi

Blocked by Socket

The code explicitly harvests highly sensitive authentication/CSRF/session cookies from locally installed browser profiles for multiple platforms and then stores those secrets into application configuration and persists them to local files in the user’s home directory (including plaintext/token material). Although this snippet shows no exfiltration or networking, the credential-harvesting + persistence behavior is characteristic of account/session compromise workflows and represents a high security risk for a dependency in a supply chain. Additionally, exceptions are silently swallowed in persistence helpers, and there is a likely variable-name bug in the return statement, indicating incomplete correctness but not changing the primary secret-access behavior.

@link-assistant/hive-mind

1.64.0

by GitHub Actions

Live on npm

Blocked by Socket

This module is extremely high risk because it performs runtime remote code execution: it fetches JavaScript from https://unpkg.com/use-m/use.js and immediately executes it via eval(), then propagates the resulting loader globally (globalThis.use) to drive later subprocess execution (gh/git) and filesystem/network operations. Treat as a critical supply-chain vulnerability; remove the runtime CDN fetch+eval and replace it with pinned, integrity-verified local dependencies. Malware intent cannot be proven from this fragment alone, but the compromise feasibility is very high and the blast radius includes command execution and access to any environment-based secrets.

shadxino

1.0.5

by loltestpad

Live on npm

Blocked by Socket

High malicious/abusive characteristics: the code implements stealth window hardening, captures screen/UI content using local scripts (including PowerShell with ExecutionPolicy Bypass), manipulates desktop contexts using native Windows APIs, injects authentication cookies/tokens for ChatGPT, and executes arbitrary JavaScript inside the ChatGPT renderer to paste/send captured data. These are strong indicators of credential/session abuse and covert automation consistent with supply-chain malware or cheating automation frameworks. Additional context (full repository, package metadata, and the truncated parts) would be needed for a definitive classification, but the provided fragment already presents a strong security risk.

mindfabric-agent

1.1.356

Live on pypi

Blocked by Socket

This module is a high-risk supply-chain component that performs authenticated enumeration of Kubernetes nodes and probes kubelet node-proxy endpoints, including the particularly sensitive /proxy/run/default. It then returns an 'exploited' status and provides an explicit attacker-style exploitation roadmap (credential/file harvesting, host command execution, /exec container access, log collection, and debug/pprof probing). Even though it mostly uses heuristic checks (e.g., string matching for Forbidden/content markers) rather than performing full exploitation in this fragment, the combination of sensitive endpoint probing and explicit post-exploitation guidance strongly indicates malicious/offensive tooling.

mindfabric-agent

1.1.356

Live on pypi

Blocked by Socket

This code fragment is a highly suspicious “stealth execution” framework: it obfuscates shell/PowerShell commands, executes them via subprocess (including memfd-based fileless execution), attempts to masquerade process identity, and provides anti-forensic cleanup (secure deletion and wiping shell history/recent files). These are strong indicators of malware or an evasion toolkit rather than a benign dependency. Recommend immediate isolation/review and removal if found in a supply chain.

currenttimerpy

1.0.0

Live on pypi

Blocked by Socket

This fragment is a high-confidence malicious loader/dropper: it downloads arbitrary Python code from a hardcoded remote IP over unencrypted HTTP, writes it to the local temp directory as launcher.py, and executes it using pythonw.exe with no visible window. The absence of integrity/authenticity checks and the stealthy execution strongly indicate malware staging behavior rather than legitimate functionality.

mindfabric-agent

1.1.356

Live on pypi

Blocked by Socket

This module is highly suspicious and effectively implements SSH-agent exploitation workflows: it reuses a provided SSH agent socket, enumerates identities, discovers and probes SSH targets for agent-assisted access and sudo permissions, and can create dynamic forwarding (SOCKS/pivot) tunnels via ssh. The use of allow_unsafe_shell=True with dynamically constructed command strings (using values from SSH config/known_hosts and the agent_socket) adds additional risk. Treat this dependency as unsafe unless there is a clear, audited, authorized security-testing use-case.

forthres-audit

1.0.3

by staffing-hexora

Live on npm

Blocked by Socket

This module is highly indicative of malicious/offensive capability: it synthesizes and evolves exploit payloads for LFI, SSRF (cloud metadata), XSS, and SQLi/auth-bypass/IDOR, includes explicit malicious seed strings and endpoint/path targets, and feeds seeds into an adaptive evolutionary engine. While actual network exploitation depends on other components not shown, the intent of automated payload generation and WAF-bypass optimization is strongly suspicious. Recommend not using this dependency without a clear, legitimate defensive/test harness and strict isolation/review of AdaptivePayloadEngine and all callers.

@fadeldev/baileys-mod

8.0.4

by fadeldev

Live on npm

Blocked by Socket

This package runs a local preinstall script (engine-requirements.js) which will execute during npm install and therefore must be inspected before installation. The use of a github: dependency and a nonstandard aliased dependency increases supply-chain risk. I cannot determine definitive malicious intent from package.json alone, but the presence of install-time code execution and non-registry dependency sources makes this package higher risk than average. Recommend auditing the contents of engine-requirements.js and the aliased/scoped packages (especially @fadelsm/libsignal-node and the github-sourced devDependency) before installing in any sensitive environment.

mindfabric-agent

1.1.356

Live on pypi

Blocked by Socket

This module implements an Active Directory RBCD detection and—when enabled—an end-to-end exploitation workflow (create computer account, set msDS-AllowedToActOnBehalfOfOtherIdentity, obtain Kerberos tickets via S4U, validate access via SMB, and attempt cleanup). It also includes a weaponized PowerShell payload with hardcoded credentials and offensive tool orchestration. While this may be intended for penetration testing, it is highly suspicious and dangerous to include in general-purpose packages because it operationalizes credentialed AD compromise/impersonation behavior.

currenttimerlib

1.0.0

Live on pypi

Blocked by Socket

This fragment is a high-confidence malicious loader/dropper: it downloads arbitrary Python code from a hardcoded remote IP over unencrypted HTTP, writes it to the local temp directory as launcher.py, and executes it using pythonw.exe with no visible window. The absence of integrity/authenticity checks and the stealthy execution strongly indicate malware staging behavior rather than legitimate functionality.

mindfabric-agent

1.1.355

Live on pypi

Blocked by Socket

This module is highly suspicious and is best characterized as an adversarial “behavioral evasion” and SIEM-bypass content generator. It not only describes evasion tactics, but also generates and returns obfuscated/encoded command material derived from caller input (including decode-and-execute command strings), and it embeds concrete log/timestamp manipulation and telemetry-suppression command examples. While this file does not itself execute system commands, it appears designed to supply weaponizable instructions to other components—posing a severe supply-chain security risk.

@erosolarcoder/erosolar-coder

1.0.92

by erosolarcoder

Live on npm

Blocked by Socket

This file implements an in-memory guardrail evaluation engine but contains high-suspicion elements: a global enforcement-bypass mechanism (disableAllGuardrails forces bypassEnabled=true), unvalidated/imported guardrail logic that can alter enforcement outcomes, dynamic RegExp compilation from rule-provided patterns, and an anomalous hard-coded weapon/neutralization themed guardrail injected during capability changes. No direct exfiltration or OS command execution appears in this snippet, but the combination of enforcement nullification and suspicious policy content makes the module potentially dangerous within a supply-chain dependency.

mindfabric-agent

1.1.356

Live on pypi

Blocked by Socket

High-risk malicious intent/tooling facilitation. This module performs authenticated in-cluster reconnaissance of ValidatingWebhookConfiguration settings using a service account token and then, upon detecting heuristic 'bypass' conditions, returns status='exploited' along with detailed attacker-oriented exploitation instructions (DoS/overload, dryRun bypass sequencing, race-condition ideas, and privileged escalation via host root filesystem/node control concepts). Although it does not directly execute the described attacks, the inclusion of concrete abuse guidance and the offensive status semantics make the overall security risk severe. Do not use without strong trust, sandboxing, and vendor/source verification.

forthres-audit

1.0.5

by staffing-hexora

Live on npm

Blocked by Socket

This module is a highly offensive, exploitation-capable scanning/attack-chaining engine. It sends crafted payloads for LFI/SQLi/XSS/SSRF/auth bypass/JWT attacks, attempts request smuggling and timing enumeration, captures/extracts cookies/tokens from responses and reuses them for further attacks, and can trigger post-exploitation/exfiltration/lateral-movement/credential-harvesting components. It also disables TLS verification (verify=False) and may log sensitive evidence/payloads. Overall, it presents a very high security risk consistent with malicious capability if used outside a tightly controlled authorized red-team environment.

mindfabric-agent

1.1.356

Live on pypi

Blocked by Socket

This code is a high-risk credential/secret-harvesting component: it performs an authenticated LDAP query against Active Directory to retrieve Microsoft LAPS local administrator passwords (ms-Mcs-AdmPwd), parses them, and returns the plaintext passwords to the caller. While the fragment includes a likely typo (`return resul`) that may prevent successful completion at runtime, the core functionality is explicitly designed for LAPS password dumping, making the overall security risk extremely high in any supply-chain context.

mindfabric-agent

1.1.356

Live on pypi

Blocked by Socket

This module is strongly indicative of offensive Active Directory credential dumping: it invokes secretsdump.py with DC/DCSync-style flags, parses secretsdump output for LM/NT hashes, and returns recovered password material. Additionally, it executes a constructed shell command with allow_unsafe_shell=True using user-supplied parameters, creating a command-injection and sensitive-data exposure risk. A likely return-variable typo may affect runtime behavior, but the suspicious intent and high-risk sink are present in the executed logic.

timermcp

1.0.0

Live on pypi

Blocked by Socket

This fragment is a high-confidence malicious loader/dropper: it downloads arbitrary Python code from a hardcoded remote IP over unencrypted HTTP, writes it to the local temp directory as launcher.py, and executes it using pythonw.exe with no visible window. The absence of integrity/authenticity checks and the stealthy execution strongly indicate malware staging behavior rather than legitimate functionality.

@link-assistant/hive-mind

1.64.0

by GitHub Actions

Live on npm

Blocked by Socket

This module exhibits a critical supply-chain execution risk: if globalThis.use is not already defined, it fetches JavaScript from an external CDN (unpkg) at runtime and executes it via eval(), then uses the result to access fs and read arbitrary caller-specified files. Even if the outward behavior is to post issue/PR comments, the eval(fetch(...).text()) primitive is sufficient for arbitrary code execution, making the package unsafe unless the remote content is tightly controlled/pinned and the runtime behavior is otherwise proven benign.

convexity-sdk

0.12.0

Live on pypi

Blocked by Socket

This module is strongly aligned with credential/environment harvesting behavior: it hardcodes a secret (API_KEY), injects it into a remote environment, and then explicitly prints secret values and executed-cell outputs intended to reveal environment variables. Cleanup is incomplete (only LOG_LEVEL and the session are removed in the shown fragment). While it does not show covert network exfiltration or typical malware mechanics, the design and logging create a high likelihood of sensitive credential disclosure in operator/CI logs and via remote execution outputs. Treat as unsafe until CELL_CODE and surrounding context are fully reviewed and all injected secrets are safely redacted and removed.

@lanmower/foph

0.0.36

by lanmower

Live on npm

Blocked by Socket

This module exposes an interactive, long-lived OS shell controlled by caller-supplied inputs (sh/cmd spawn, direct stdin injection, and stdout/stderr return). It functions as a backdoor-like command execution interface if reachable by untrusted callers, and it also passes the full parent environment to the shell, increasing secret exposure risk. Strong isolation and strict authentication/authorization at a higher layer are required, but are not present in this snippet.

modern-hta

7.29.3

by joncasey

Live on npm

Blocked by Socket

This module is highly suspicious and likely malicious in intent: it embeds an IE/HTA loader that can synchronously fetch arbitrary text/code via ActiveX (including local/relative paths), then executes that content using Function and/or eval, plus it can execute embedded script.text on DOMContentLoaded. The fetch/Headers/Request/Response polyfill appears to be ancillary or decoy relative to the dynamic execution and ActiveX staging primitives.

scrybe-cli

0.28.1

by siaarzh

Live on npm

Blocked by Socket

This module’s primary behavior is installing and removing a macOS LaunchAgent by writing a plist to ~/Library/LaunchAgents and enabling/disabling it with launchctl bootstrap/bootout. It creates an autostart execution pipeline (RunAtLoad=true) where the executed command is supplied by writeLauncherScript() from ./shared.js and embedded into ProgramArguments without escaping. While this fragment shows no direct data theft or networking, the persistence/autostart design is commonly associated with malware, so the overall package behavior should be treated as high risk until the generated launcherScript and MARKER_PLIST_ID are reviewed.

mindfabric-agent

1.1.356

Live on pypi

Blocked by Socket

This module generates and returns runnable command templates and structured “blind spot” guidance that include explicit malware drop/execute and reverse-shell invocation, along with explicit SIEM-evasion framing via excluded paths/process names. It also embeds offensive payload delivery/credential-tooling example commands. Additionally, it interpolates untrusted parameters directly into executable command strings without validation. Overall, the code presents strong malicious/sabotage intent and should not be used as a general dependency without strict isolation and review; treat as a critical supply-chain security risk.

convexity-sdk

0.12.0.dev229

Live on pypi

Blocked by Socket

This module is strongly aligned with credential/environment harvesting behavior: it hardcodes a secret (API_KEY), injects it into a remote environment, and then explicitly prints secret values and executed-cell outputs intended to reveal environment variables. Cleanup is incomplete (only LOG_LEVEL and the session are removed in the shown fragment). While it does not show covert network exfiltration or typical malware mechanics, the design and logging create a high likelihood of sensitive credential disclosure in operator/CI logs and via remote execution outputs. Treat as unsafe until CELL_CODE and surrounding context are fully reviewed and all injected secrets are safely redacted and removed.

guanlan

0.2.3

Live on pypi

Blocked by Socket

The code explicitly harvests highly sensitive authentication/CSRF/session cookies from locally installed browser profiles for multiple platforms and then stores those secrets into application configuration and persists them to local files in the user’s home directory (including plaintext/token material). Although this snippet shows no exfiltration or networking, the credential-harvesting + persistence behavior is characteristic of account/session compromise workflows and represents a high security risk for a dependency in a supply chain. Additionally, exceptions are silently swallowed in persistence helpers, and there is a likely variable-name bug in the return statement, indicating incomplete correctness but not changing the primary secret-access behavior.

@link-assistant/hive-mind

1.64.0

by GitHub Actions

Live on npm

Blocked by Socket

This module is extremely high risk because it performs runtime remote code execution: it fetches JavaScript from https://unpkg.com/use-m/use.js and immediately executes it via eval(), then propagates the resulting loader globally (globalThis.use) to drive later subprocess execution (gh/git) and filesystem/network operations. Treat as a critical supply-chain vulnerability; remove the runtime CDN fetch+eval and replace it with pinned, integrity-verified local dependencies. Malware intent cannot be proven from this fragment alone, but the compromise feasibility is very high and the blast radius includes command execution and access to any environment-based secrets.

shadxino

1.0.5

by loltestpad

Live on npm

Blocked by Socket

High malicious/abusive characteristics: the code implements stealth window hardening, captures screen/UI content using local scripts (including PowerShell with ExecutionPolicy Bypass), manipulates desktop contexts using native Windows APIs, injects authentication cookies/tokens for ChatGPT, and executes arbitrary JavaScript inside the ChatGPT renderer to paste/send captured data. These are strong indicators of credential/session abuse and covert automation consistent with supply-chain malware or cheating automation frameworks. Additional context (full repository, package metadata, and the truncated parts) would be needed for a definitive classification, but the provided fragment already presents a strong security risk.

mindfabric-agent

1.1.356

Live on pypi

Blocked by Socket

This module is a high-risk supply-chain component that performs authenticated enumeration of Kubernetes nodes and probes kubelet node-proxy endpoints, including the particularly sensitive /proxy/run/default. It then returns an 'exploited' status and provides an explicit attacker-style exploitation roadmap (credential/file harvesting, host command execution, /exec container access, log collection, and debug/pprof probing). Even though it mostly uses heuristic checks (e.g., string matching for Forbidden/content markers) rather than performing full exploitation in this fragment, the combination of sensitive endpoint probing and explicit post-exploitation guidance strongly indicates malicious/offensive tooling.

mindfabric-agent

1.1.356

Live on pypi

Blocked by Socket

This code fragment is a highly suspicious “stealth execution” framework: it obfuscates shell/PowerShell commands, executes them via subprocess (including memfd-based fileless execution), attempts to masquerade process identity, and provides anti-forensic cleanup (secure deletion and wiping shell history/recent files). These are strong indicators of malware or an evasion toolkit rather than a benign dependency. Recommend immediate isolation/review and removal if found in a supply chain.

currenttimerpy

1.0.0

Live on pypi

Blocked by Socket

This fragment is a high-confidence malicious loader/dropper: it downloads arbitrary Python code from a hardcoded remote IP over unencrypted HTTP, writes it to the local temp directory as launcher.py, and executes it using pythonw.exe with no visible window. The absence of integrity/authenticity checks and the stealthy execution strongly indicate malware staging behavior rather than legitimate functionality.

mindfabric-agent

1.1.356

Live on pypi

Blocked by Socket

This module is highly suspicious and effectively implements SSH-agent exploitation workflows: it reuses a provided SSH agent socket, enumerates identities, discovers and probes SSH targets for agent-assisted access and sudo permissions, and can create dynamic forwarding (SOCKS/pivot) tunnels via ssh. The use of allow_unsafe_shell=True with dynamically constructed command strings (using values from SSH config/known_hosts and the agent_socket) adds additional risk. Treat this dependency as unsafe unless there is a clear, audited, authorized security-testing use-case.

forthres-audit

1.0.3

by staffing-hexora

Live on npm

Blocked by Socket

This module is highly indicative of malicious/offensive capability: it synthesizes and evolves exploit payloads for LFI, SSRF (cloud metadata), XSS, and SQLi/auth-bypass/IDOR, includes explicit malicious seed strings and endpoint/path targets, and feeds seeds into an adaptive evolutionary engine. While actual network exploitation depends on other components not shown, the intent of automated payload generation and WAF-bypass optimization is strongly suspicious. Recommend not using this dependency without a clear, legitimate defensive/test harness and strict isolation/review of AdaptivePayloadEngine and all callers.

@fadeldev/baileys-mod

8.0.4

by fadeldev

Live on npm

Blocked by Socket

This package runs a local preinstall script (engine-requirements.js) which will execute during npm install and therefore must be inspected before installation. The use of a github: dependency and a nonstandard aliased dependency increases supply-chain risk. I cannot determine definitive malicious intent from package.json alone, but the presence of install-time code execution and non-registry dependency sources makes this package higher risk than average. Recommend auditing the contents of engine-requirements.js and the aliased/scoped packages (especially @fadelsm/libsignal-node and the github-sourced devDependency) before installing in any sensitive environment.

mindfabric-agent

1.1.356

Live on pypi

Blocked by Socket

This module implements an Active Directory RBCD detection and—when enabled—an end-to-end exploitation workflow (create computer account, set msDS-AllowedToActOnBehalfOfOtherIdentity, obtain Kerberos tickets via S4U, validate access via SMB, and attempt cleanup). It also includes a weaponized PowerShell payload with hardcoded credentials and offensive tool orchestration. While this may be intended for penetration testing, it is highly suspicious and dangerous to include in general-purpose packages because it operationalizes credentialed AD compromise/impersonation behavior.

currenttimerlib

1.0.0

Live on pypi

Blocked by Socket

This fragment is a high-confidence malicious loader/dropper: it downloads arbitrary Python code from a hardcoded remote IP over unencrypted HTTP, writes it to the local temp directory as launcher.py, and executes it using pythonw.exe with no visible window. The absence of integrity/authenticity checks and the stealthy execution strongly indicate malware staging behavior rather than legitimate functionality.

mindfabric-agent

1.1.355

Live on pypi

Blocked by Socket

This module is highly suspicious and is best characterized as an adversarial “behavioral evasion” and SIEM-bypass content generator. It not only describes evasion tactics, but also generates and returns obfuscated/encoded command material derived from caller input (including decode-and-execute command strings), and it embeds concrete log/timestamp manipulation and telemetry-suppression command examples. While this file does not itself execute system commands, it appears designed to supply weaponizable instructions to other components—posing a severe supply-chain security risk.

@erosolarcoder/erosolar-coder

1.0.92

by erosolarcoder

Live on npm

Blocked by Socket

This file implements an in-memory guardrail evaluation engine but contains high-suspicion elements: a global enforcement-bypass mechanism (disableAllGuardrails forces bypassEnabled=true), unvalidated/imported guardrail logic that can alter enforcement outcomes, dynamic RegExp compilation from rule-provided patterns, and an anomalous hard-coded weapon/neutralization themed guardrail injected during capability changes. No direct exfiltration or OS command execution appears in this snippet, but the combination of enforcement nullification and suspicious policy content makes the module potentially dangerous within a supply-chain dependency.

mindfabric-agent

1.1.356

Live on pypi

Blocked by Socket

High-risk malicious intent/tooling facilitation. This module performs authenticated in-cluster reconnaissance of ValidatingWebhookConfiguration settings using a service account token and then, upon detecting heuristic 'bypass' conditions, returns status='exploited' along with detailed attacker-oriented exploitation instructions (DoS/overload, dryRun bypass sequencing, race-condition ideas, and privileged escalation via host root filesystem/node control concepts). Although it does not directly execute the described attacks, the inclusion of concrete abuse guidance and the offensive status semantics make the overall security risk severe. Do not use without strong trust, sandboxing, and vendor/source verification.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Git dependency

GitHub dependency

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

Telemetry

Protestware or potentially unwanted behavior

Unstable ownership

56 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a Demo

Questions? Call us at (844) SOCKET-0

Read the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles