
Security News
Deno 2.6 + Socket: Supply Chain Defense In Your CLI
Deno 2.6 introduces deno audit with a new --socket flag that plugs directly into Socket to bring supply chain security checks into the Deno CLI.
Quickly evaluate the security and health of any open source package.
vector-vault
5.2.8
Live on PyPI
Blocked by Socket
This component sends supplied credentials (user and api) to a hardcoded third‑party endpoint and uses the returned token as a Bearer Authorization header for subsequent requests. That behavior constitutes high risk: if the endpoint is untrusted or controlled by an attacker, credentials can be exfiltrated and authentication can be delegated to an attacker-controlled token provider. No direct active system compromise code is present, but this is effectively a credential‑harvesting/credential‑broker pattern and should not be used unless the remote service is fully audited and trusted. Recommend replacing with standard OAuth flows using trusted endpoints, removing synchronous network I/O from constructors, and avoiding indiscriminate pickling of credential state.
hamctl
0.2.3
by hamravesh
Removed from npm
Blocked by Socket
The command appears to invoke a non-standard npm command, which raises concerns about its safety and potential for malicious behavior. Further investigation into the 'go-npm' package is necessary.
Live on npm for 1 day, 2 hours and 9 minutes before removal. Socket users were protected even while the package was live.
meutils
2025.8.26.12.41.0
Live on PyPI
Blocked by Socket
This code appears to be a legitimate API client that has been compromised or designed for data exfiltration. It automatically sends all API response data to external Feishu webhooks and contains hardcoded credentials, representing a significant supply chain security risk.
dongpeng-common-ui
1.0.0
by weijhfly
Removed from npm
Blocked by Socket
The script attempts to install a commit message hook from a specified URL. If the source is not trusted, this could lead to malicious behavior.
Live on npm for 37 minutes before removal. Socket users were protected even while the package was live.
bane
1.6.8
Live on PyPI
Blocked by Socket
This code implements a malicious IoT credential-harvesting framework. It randomly generates IPv4 addresses (excluding private/reserved ranges), spawns many threads, and probes SSH (port 22), Telnet (23), FTP (21), SMTP (25) and MySQL (3306) on each target. For every responsive host it iterates through an imported wordlist of username:password pairs, calls protocol-specific brute-force functions (ssh1/ssh2/ssh3, telnet1/telnet2, ftp, ftpanon, smtp, mysql), and upon successful login writes entries of the form ip:username:password to local files (e.g., sshbots.txt, telnetbots.txt, ftpbots.txt, smtpbots.txt, mysqlbots.txt). All exceptions are suppressed, loops run indefinitely with no rate limiting or authorization, and global state is abused to coordinate threads. Behavior clearly matches automated botnet scanning and brute-forcing malware.
fedengahbicbjfchmjfnkeemahamdiml
1.0.7.60
Live on Chrome Web Store
Blocked by Socket
The snippet automates credential retrieval, form autofill, submission, and redirection to an external domain, accompanied by storage clearing. While usable in controlled SSO or legitimate automation, the combination of automated credential handling, external navigation, and trace cleanup strongly suggests potential credential harvesting or data exfiltration risks in a browser extension context. Recommend rigorous review of extension permissions, user consent prompts, destination trust, and provenance before enabling this behavior in production.
pidl-react
6.869.0
Removed from npm
Blocked by Socket
The source code exhibits clear signs of malicious behavior by sending environment variables to an obfuscated external server. This poses a significant security risk as it can lead to data breaches.
Live on npm for 1 hour and 12 minutes before removal. Socket users were protected even while the package was live.
@blocklet/pages-kit
0.4.7
by wangshijun
Live on npm
Blocked by Socket
This file injects a module-load routine that exfiltrates local documentation/metadata (dumpJSON) to a remote AI Studio dataset (ID 443696818363039744) at bbqa2t5pfyfroyobmzknmktshckzto4btkfagxyjqwy[.]did[.]abtnet[.]io[ ]/api/datasets/443696818363039744/documents. It uses a hard-coded Cookie header containing a login_token JWT and unconditional shouldUpdateKnowledge=true to first GET existing items via GET …?page=1&size=100, then PUT to …/documents/{id}/text or POST to …/documents/text, sending the full serialized dumpJSON as the request body. These automatic side-effects with embedded credentials create a high-risk supply-chain and privacy backdoor and must be removed or gated behind explicit, opt-in credential handling.
docusaurus-plugin-matamohnhb
5.5.5
by faique
Removed from npm
Blocked by Socket
The code exhibits behavior consistent with a backdoor designed for unauthorized data collection and exfiltration. The collection of sensitive data and its transmission to a suspicious domain without user consent suggests malicious intent. The package should be considered compromised and not used in any production environment.
Live on npm for 14 hours and 43 minutes before removal. Socket users were protected even while the package was live.
mtmai
0.3.1300
Live on PyPI
Blocked by Socket
This fragment intends to install and start KasmVNC by running many shell commands that create certs, write VNC password files, adjust group membership, and launch a VNC server. The primary security issues are unsafe shell interpolation (command injection risk), programmatic persistence of a possibly predictable password, execution with sudo based on unvalidated env vars, starting a VNC server exposed on 0.0.0.0 with disabled/basic auth, and multiple unsafe filesystem operations performed via shell. There is no clear evidence of obfuscated or direct exfiltration malware, but the behavior can provide an unauthorized remote access vector (backdoor-like) if used maliciously. Do not run this code without fixing shell usage, validating inputs, using secure randomly generated passwords, enforcing proper file permissions, and not disabling authentication.
dementor
1.0.0.dev5
Live on PyPI
Blocked by Socket
This module persistently records credentials (including plaintext passwords) and logs them to console/logs. The code exhibits clear credential-capture behavior. There is no sign of network exfiltration or dynamic obfuscation in this fragment, but the lack of encryption, access controls, and the explicit logging and database storage of secrets make it high-risk for misuse or accidental leakage. If this package is intended as an offensive tool (credential capture), it is malicious by purpose in many contexts; if intended for legitimate auditing, it still poses significant security and privacy concerns and must be used with strong access controls and consent. The db_schema stubs (empty cursor.execute calls) are anomalous and indicate either an incomplete snippet or tampering.
reothor.lab.evilpackage
100.0.0
by Frode Hus
Live on NuGet
Blocked by Socket
This MSBuild file contains an explicit malicious backdoor: an inline Roslyn task that runs during the build to download and execute remote scripts on both Unix-like and Windows systems. It enables remote code execution in the build environment, uses obfuscation (base64 PowerShell), and is triggered automatically without user consent. Treat it as active malware: remove the file, blacklist the package, audit build systems and artifact repositories for builds that executed it, and investigate any network endpoints referenced. Do not use this package.
cl-lite
1.0.825
by michael_tian
Live on npm
Blocked by Socket
This file is a blob of HTML/spam content with embedded links to adult videos, torrent downloads and suspicious redirectors (e.g. https://2023[.]redircdn[.]com/?…, http://rmdown[.]com/link[.]php?hash=…, http://data[.]down2048[.]com/list[.]php?…), plus numerous third-party image URLs. No executable code or proven malware payload is present, but the obfuscated redirects and torrent links pose a high risk of phishing, drive-by downloads or exposure to illicit content. Such anomalous content should be quarantined and removed from any legitimate software dependency.
vajra-nightly
0.1.dev2025032106
Removed from PyPI
Blocked by Socket
This script is functionally legitimate for provisioning GitHub Actions self-hosted GPU runners but contains several high-impact security risks. Primary concerns: it passes the full GitHub token into containers (exposing org-level credentials), mounts the host Docker socket into those containers (giving containers effectively full control over the host), and builds/executes docker commands via eval using unsanitized fields from the JSON spec (shell injection risk). If attacker-controlled inputs (spec file, image, or token) are present, an attacker could execute arbitrary host commands, exfiltrate secrets, or compromise the GitHub organization. Recommend refusing to run this script in untrusted environments, removing/avoiding docker.sock mount, avoiding eval (use arrays or exec directly), sanitizing spec values, limiting container network/capabilities, and using short-lived, least-privilege tokens or ephemeral registration mechanisms.
Live on PyPI for 32 minutes before removal. Socket users were protected even while the package was live.
harekrishnarai/flowlyt
c95a3e3df80ba68ea37d21624cfbfaad579885ff
Live on GitHub Actions
Blocked by Socket
This workflow is intentionally insecure and contains many clear supply-chain and CI/CD attack vectors: command injection (eval/exec/Invoke-Expression/pipe-to-bash), remote script execution (curl | bash), use of untrusted/typosquatted/unpinned actions, secrets passed to untrusted actions or printed, cross-repo access with tokens, and risky self-hosted privileged operations. It should not be used as-is in production. Mitigations include: never execute untrusted event data, avoid pull_request_target for running untrusted code, pin and verify actions, do not pass secrets to third-party or unverified actions, avoid curl|bash and running untrusted docker images privileged, and restrict self-hosted runners. Treat this workflow as malicious/insecure.
mrsimulator
0.3.0b1
Removed from PyPI
Blocked by Socket
The module contains unsafe use of eval() and exec() executing dynamically constructed strings based on Parameter keys/values and decoded attribute paths. This enables code injection if an attacker can control lmfit.Parameters or the contents of parameter values/names. I did not find explicit malicious payloads in this file, but the dynamic execution pattern is a serious supply-chain/security risk: an attacker could craft Parameters to execute arbitrary code on any system that runs LMFIT_min_function (or related update functions) with untrusted input. Recommendation: avoid exec/eval, validate/sanitize parameter names and values, restrict to numeric types, or map parameters to attributes using safe attribute access (getattr/setattr) instead of string eval/exec.
Live on PyPI for 13 hours and 10 minutes before removal. Socket users were protected even while the package was live.
poc-malicious-sim
1.0.3
by jamilismmm
Removed from npm
Blocked by Socket
The code contains a clear malicious backdoor that exfiltrates local data to an external server without user consent. This is a serious security risk and constitutes malware behavior. The code is not obfuscated but is highly dangerous and should be considered untrusted and unsafe.
Live on npm for 55 days, 20 hours and 16 minutes before removal. Socket users were protected even while the package was live.
io.bdeploy:api
7.6.1
Live on Maven Central
Blocked by Socket
The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.
aem-spa-component-mapping
9999.999.999
by k4r1it0
Removed from npm
Blocked by Socket
The code collects sensitive system data and sends it to a remote server without user consent. This behavior raises privacy concerns and potential unauthorized data transmission, which poses a security risk.
Live on npm for 4 days, 12 hours and 47 minutes before removal. Socket users were protected even while the package was live.
@evt-cdk/codepipeline
7.0.2
Live on npm
Blocked by Socket
This code implements covert data collection and exfiltration of machine-identifying information (local username, OS type, public IP) to a hard-coded third-party domain. The use of synchronous shell execution (curl) and HTTP (unprotected) transport, combined with silent behavior and no consent, constitute clear malicious/backdoor-like behavior. The module should be treated as malicious and not used; investigate any projects depending on this code and remove/replace it immediately.
nf-cl-logger-logger-logger
99.99.22
by slaxome
Removed from npm
Blocked by Socket
The code exhibits a deliberate backdoor-like payload: obfuscated dynamic module loading, environment-aware command execution, and DNS-based data exfiltration tailored to the package context. This indicates malicious intent and constitutes a severe supply-chain risk if present in an open-source dependency. Immediate remediation should include removal, integrity verification, and enabling tamper-evident signing and strict dependency auditing.
Live on npm for 18 hours and 42 minutes before removal. Socket users were protected even while the package was live.
richness-client-side-validator
1.1.3
by richnessinc
Live on npm
Blocked by Socket
The package contains a hidden payload that targets Russian language users visiting Russian and Belarusian sites. For those users, it will disable user interaction and play a looping audio of the Ukrainian anthem after 3 days. This behavior is not disclosed in any documentation of the package and seriously disrupts user experience.
examtool
2.1.15b281.dev1
Live on PyPI
Blocked by Socket
This module purposefully enables command execution and remote downloads during LaTeX rendering. The transformation that replaces \includegraphics{http...} with a write18 wget call and the use of pdflatex --shell-escape are unsafe when any part of the LaTeX input (exam or subs) is or can be attacker-controlled. The code permits arbitrary command execution and network fetches with no sanitization or sandboxing — a high-risk behavior in a supply-chain context. Do not run this on untrusted input; if retained, restrict inputs strictly or remove the write18/wget mechanism and avoid --shell-escape. Use subprocess with sanitized args and sandboxing instead.
simba-uw-tf-dev
1.94.4
Live on PyPI
Blocked by Socket
The code has significant security risks due to the dynamic execution of user-defined code and the potential for command injection through subprocess calls. Proper validation and sanitization of user inputs are essential to mitigate these risks.
passagemath-macaulay2
10.6.5
Removed from PyPI
Blocked by Socket
This install script performs a destructive filesystem operation (removing the katex directory) and then executes an unknown command. Even if not overtly labeled as malware, it poses a high risk: it can cause data loss and enables execution of arbitrary code. You should not run this without inspecting the package contents and verifying what `copy-files-from-to` refers to and why katex is being removed.
Live on PyPI for 3 hours and 36 minutes before removal. Socket users were protected even while the package was live.
vector-vault
5.2.8
Live on PyPI
Blocked by Socket
This component sends supplied credentials (user and api) to a hardcoded third‑party endpoint and uses the returned token as a Bearer Authorization header for subsequent requests. That behavior constitutes high risk: if the endpoint is untrusted or controlled by an attacker, credentials can be exfiltrated and authentication can be delegated to an attacker-controlled token provider. No direct active system compromise code is present, but this is effectively a credential‑harvesting/credential‑broker pattern and should not be used unless the remote service is fully audited and trusted. Recommend replacing with standard OAuth flows using trusted endpoints, removing synchronous network I/O from constructors, and avoiding indiscriminate pickling of credential state.
hamctl
0.2.3
by hamravesh
Removed from npm
Blocked by Socket
The command appears to invoke a non-standard npm command, which raises concerns about its safety and potential for malicious behavior. Further investigation into the 'go-npm' package is necessary.
Live on npm for 1 day, 2 hours and 9 minutes before removal. Socket users were protected even while the package was live.
meutils
2025.8.26.12.41.0
Live on PyPI
Blocked by Socket
This code appears to be a legitimate API client that has been compromised or designed for data exfiltration. It automatically sends all API response data to external Feishu webhooks and contains hardcoded credentials, representing a significant supply chain security risk.
dongpeng-common-ui
1.0.0
by weijhfly
Removed from npm
Blocked by Socket
The script attempts to install a commit message hook from a specified URL. If the source is not trusted, this could lead to malicious behavior.
Live on npm for 37 minutes before removal. Socket users were protected even while the package was live.
bane
1.6.8
Live on PyPI
Blocked by Socket
This code implements a malicious IoT credential-harvesting framework. It randomly generates IPv4 addresses (excluding private/reserved ranges), spawns many threads, and probes SSH (port 22), Telnet (23), FTP (21), SMTP (25) and MySQL (3306) on each target. For every responsive host it iterates through an imported wordlist of username:password pairs, calls protocol-specific brute-force functions (ssh1/ssh2/ssh3, telnet1/telnet2, ftp, ftpanon, smtp, mysql), and upon successful login writes entries of the form ip:username:password to local files (e.g., sshbots.txt, telnetbots.txt, ftpbots.txt, smtpbots.txt, mysqlbots.txt). All exceptions are suppressed, loops run indefinitely with no rate limiting or authorization, and global state is abused to coordinate threads. Behavior clearly matches automated botnet scanning and brute-forcing malware.
fedengahbicbjfchmjfnkeemahamdiml
1.0.7.60
Live on Chrome Web Store
Blocked by Socket
The snippet automates credential retrieval, form autofill, submission, and redirection to an external domain, accompanied by storage clearing. While usable in controlled SSO or legitimate automation, the combination of automated credential handling, external navigation, and trace cleanup strongly suggests potential credential harvesting or data exfiltration risks in a browser extension context. Recommend rigorous review of extension permissions, user consent prompts, destination trust, and provenance before enabling this behavior in production.
pidl-react
6.869.0
Removed from npm
Blocked by Socket
The source code exhibits clear signs of malicious behavior by sending environment variables to an obfuscated external server. This poses a significant security risk as it can lead to data breaches.
Live on npm for 1 hour and 12 minutes before removal. Socket users were protected even while the package was live.
@blocklet/pages-kit
0.4.7
by wangshijun
Live on npm
Blocked by Socket
This file injects a module-load routine that exfiltrates local documentation/metadata (dumpJSON) to a remote AI Studio dataset (ID 443696818363039744) at bbqa2t5pfyfroyobmzknmktshckzto4btkfagxyjqwy[.]did[.]abtnet[.]io[ ]/api/datasets/443696818363039744/documents. It uses a hard-coded Cookie header containing a login_token JWT and unconditional shouldUpdateKnowledge=true to first GET existing items via GET …?page=1&size=100, then PUT to …/documents/{id}/text or POST to …/documents/text, sending the full serialized dumpJSON as the request body. These automatic side-effects with embedded credentials create a high-risk supply-chain and privacy backdoor and must be removed or gated behind explicit, opt-in credential handling.
docusaurus-plugin-matamohnhb
5.5.5
by faique
Removed from npm
Blocked by Socket
The code exhibits behavior consistent with a backdoor designed for unauthorized data collection and exfiltration. The collection of sensitive data and its transmission to a suspicious domain without user consent suggests malicious intent. The package should be considered compromised and not used in any production environment.
Live on npm for 14 hours and 43 minutes before removal. Socket users were protected even while the package was live.
mtmai
0.3.1300
Live on PyPI
Blocked by Socket
This fragment intends to install and start KasmVNC by running many shell commands that create certs, write VNC password files, adjust group membership, and launch a VNC server. The primary security issues are unsafe shell interpolation (command injection risk), programmatic persistence of a possibly predictable password, execution with sudo based on unvalidated env vars, starting a VNC server exposed on 0.0.0.0 with disabled/basic auth, and multiple unsafe filesystem operations performed via shell. There is no clear evidence of obfuscated or direct exfiltration malware, but the behavior can provide an unauthorized remote access vector (backdoor-like) if used maliciously. Do not run this code without fixing shell usage, validating inputs, using secure randomly generated passwords, enforcing proper file permissions, and not disabling authentication.
dementor
1.0.0.dev5
Live on PyPI
Blocked by Socket
This module persistently records credentials (including plaintext passwords) and logs them to console/logs. The code exhibits clear credential-capture behavior. There is no sign of network exfiltration or dynamic obfuscation in this fragment, but the lack of encryption, access controls, and the explicit logging and database storage of secrets make it high-risk for misuse or accidental leakage. If this package is intended as an offensive tool (credential capture), it is malicious by purpose in many contexts; if intended for legitimate auditing, it still poses significant security and privacy concerns and must be used with strong access controls and consent. The db_schema stubs (empty cursor.execute calls) are anomalous and indicate either an incomplete snippet or tampering.
reothor.lab.evilpackage
100.0.0
by Frode Hus
Live on NuGet
Blocked by Socket
This MSBuild file contains an explicit malicious backdoor: an inline Roslyn task that runs during the build to download and execute remote scripts on both Unix-like and Windows systems. It enables remote code execution in the build environment, uses obfuscation (base64 PowerShell), and is triggered automatically without user consent. Treat it as active malware: remove the file, blacklist the package, audit build systems and artifact repositories for builds that executed it, and investigate any network endpoints referenced. Do not use this package.
cl-lite
1.0.825
by michael_tian
Live on npm
Blocked by Socket
This file is a blob of HTML/spam content with embedded links to adult videos, torrent downloads and suspicious redirectors (e.g. https://2023[.]redircdn[.]com/?…, http://rmdown[.]com/link[.]php?hash=…, http://data[.]down2048[.]com/list[.]php?…), plus numerous third-party image URLs. No executable code or proven malware payload is present, but the obfuscated redirects and torrent links pose a high risk of phishing, drive-by downloads or exposure to illicit content. Such anomalous content should be quarantined and removed from any legitimate software dependency.
vajra-nightly
0.1.dev2025032106
Removed from PyPI
Blocked by Socket
This script is functionally legitimate for provisioning GitHub Actions self-hosted GPU runners but contains several high-impact security risks. Primary concerns: it passes the full GitHub token into containers (exposing org-level credentials), mounts the host Docker socket into those containers (giving containers effectively full control over the host), and builds/executes docker commands via eval using unsanitized fields from the JSON spec (shell injection risk). If attacker-controlled inputs (spec file, image, or token) are present, an attacker could execute arbitrary host commands, exfiltrate secrets, or compromise the GitHub organization. Recommend refusing to run this script in untrusted environments, removing/avoiding docker.sock mount, avoiding eval (use arrays or exec directly), sanitizing spec values, limiting container network/capabilities, and using short-lived, least-privilege tokens or ephemeral registration mechanisms.
Live on PyPI for 32 minutes before removal. Socket users were protected even while the package was live.
harekrishnarai/flowlyt
c95a3e3df80ba68ea37d21624cfbfaad579885ff
Live on GitHub Actions
Blocked by Socket
This workflow is intentionally insecure and contains many clear supply-chain and CI/CD attack vectors: command injection (eval/exec/Invoke-Expression/pipe-to-bash), remote script execution (curl | bash), use of untrusted/typosquatted/unpinned actions, secrets passed to untrusted actions or printed, cross-repo access with tokens, and risky self-hosted privileged operations. It should not be used as-is in production. Mitigations include: never execute untrusted event data, avoid pull_request_target for running untrusted code, pin and verify actions, do not pass secrets to third-party or unverified actions, avoid curl|bash and running untrusted docker images privileged, and restrict self-hosted runners. Treat this workflow as malicious/insecure.
mrsimulator
0.3.0b1
Removed from PyPI
Blocked by Socket
The module contains unsafe use of eval() and exec() executing dynamically constructed strings based on Parameter keys/values and decoded attribute paths. This enables code injection if an attacker can control lmfit.Parameters or the contents of parameter values/names. I did not find explicit malicious payloads in this file, but the dynamic execution pattern is a serious supply-chain/security risk: an attacker could craft Parameters to execute arbitrary code on any system that runs LMFIT_min_function (or related update functions) with untrusted input. Recommendation: avoid exec/eval, validate/sanitize parameter names and values, restrict to numeric types, or map parameters to attributes using safe attribute access (getattr/setattr) instead of string eval/exec.
Live on PyPI for 13 hours and 10 minutes before removal. Socket users were protected even while the package was live.
poc-malicious-sim
1.0.3
by jamilismmm
Removed from npm
Blocked by Socket
The code contains a clear malicious backdoor that exfiltrates local data to an external server without user consent. This is a serious security risk and constitutes malware behavior. The code is not obfuscated but is highly dangerous and should be considered untrusted and unsafe.
Live on npm for 55 days, 20 hours and 16 minutes before removal. Socket users were protected even while the package was live.
io.bdeploy:api
7.6.1
Live on Maven Central
Blocked by Socket
The code implements remote dynamic class loading and execution via network fetch and reflection. While such a mechanism can be legitimate for plugin ecosystems, it introduces a clear remote-code-execution risk in supply-chain contexts. It should be treated as high-risk for unauthenticated payload loading and require strong controls: TLS, payload signing/verification, strict allowlists, sandboxing, and minimum privileges. If kept, ensure robust auditing and runtime protections.
aem-spa-component-mapping
9999.999.999
by k4r1it0
Removed from npm
Blocked by Socket
The code collects sensitive system data and sends it to a remote server without user consent. This behavior raises privacy concerns and potential unauthorized data transmission, which poses a security risk.
Live on npm for 4 days, 12 hours and 47 minutes before removal. Socket users were protected even while the package was live.
@evt-cdk/codepipeline
7.0.2
Live on npm
Blocked by Socket
This code implements covert data collection and exfiltration of machine-identifying information (local username, OS type, public IP) to a hard-coded third-party domain. The use of synchronous shell execution (curl) and HTTP (unprotected) transport, combined with silent behavior and no consent, constitute clear malicious/backdoor-like behavior. The module should be treated as malicious and not used; investigate any projects depending on this code and remove/replace it immediately.
nf-cl-logger-logger-logger
99.99.22
by slaxome
Removed from npm
Blocked by Socket
The code exhibits a deliberate backdoor-like payload: obfuscated dynamic module loading, environment-aware command execution, and DNS-based data exfiltration tailored to the package context. This indicates malicious intent and constitutes a severe supply-chain risk if present in an open-source dependency. Immediate remediation should include removal, integrity verification, and enabling tamper-evident signing and strict dependency auditing.
Live on npm for 18 hours and 42 minutes before removal. Socket users were protected even while the package was live.
richness-client-side-validator
1.1.3
by richnessinc
Live on npm
Blocked by Socket
The package contains a hidden payload that targets Russian language users visiting Russian and Belarusian sites. For those users, it will disable user interaction and play a looping audio of the Ukrainian anthem after 3 days. This behavior is not disclosed in any documentation of the package and seriously disrupts user experience.
examtool
2.1.15b281.dev1
Live on PyPI
Blocked by Socket
This module purposefully enables command execution and remote downloads during LaTeX rendering. The transformation that replaces \includegraphics{http...} with a write18 wget call and the use of pdflatex --shell-escape are unsafe when any part of the LaTeX input (exam or subs) is or can be attacker-controlled. The code permits arbitrary command execution and network fetches with no sanitization or sandboxing — a high-risk behavior in a supply-chain context. Do not run this on untrusted input; if retained, restrict inputs strictly or remove the write18/wget mechanism and avoid --shell-escape. Use subprocess with sanitized args and sandboxing instead.
simba-uw-tf-dev
1.94.4
Live on PyPI
Blocked by Socket
The code has significant security risks due to the dynamic execution of user-defined code and the potential for command injection through subprocess calls. Proper validation and sanitization of user inputs are essential to mitigate these risks.
passagemath-macaulay2
10.6.5
Removed from PyPI
Blocked by Socket
This install script performs a destructive filesystem operation (removing the katex directory) and then executes an unknown command. Even if not overtly labeled as malware, it poses a high risk: it can cause data loss and enables execution of arbitrary code. You should not run this without inspecting the package contents and verifying what `copy-files-from-to` refers to and why katex is being removed.
Live on PyPI for 3 hours and 36 minutes before removal. Socket users were protected even while the package was live.
Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.
Possible typosquat attack
Known malware
Git dependency
GitHub dependency
AI-detected potential malware
HTTP dependency
Obfuscated code
Suspicious Stars on GitHub
Telemetry
Protestware or potentially unwanted behavior
Critical CVE
High CVE
Medium CVE
Low CVE
Unpopular package
Minified code
Bad dependency semver
Wildcard dependency
Socket optimized override available
Deprecated
Unmaintained
Explicitly Unlicensed Item
License Policy Violation
Misc. License Issues
Ambiguous License Classifier
Copyleft License
License exception
No License Found
Non-permissive License
Unidentified License
Generic alert
Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.
Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Nat Friedman
CEO at GitHub

Suz Hinton
Senior Software Engineer at Stripe
heck yes this is awesome!!! Congrats team 🎉👏

Matteo Collina
Node.js maintainer, Fastify lead maintainer
So awesome to see @SocketSecurity launch with a fresh approach! Excited to have supported the team from the early days.

DC Posch
Director of Technology at AppFolio, CTO at Dynasty
This is going to be super important, especially for crypto projects where a compromised dependency results in stolen user assets.

Luis Naranjo
Software Engineer at Microsoft
If software supply chain attacks through npm don't scare the shit out of you, you're not paying close enough attention.
@SocketSecurity sounds like an awesome product. I'll be using socket.dev instead of npmjs.org to browse npm packages going forward

Elena Nadolinski
Founder and CEO at Iron Fish
Huge congrats to @SocketSecurity! 🙌
Literally the only product that proactively detects signs of JS compromised packages.

Joe Previte
Engineering Team Lead at Coder
Congrats to @feross and the @SocketSecurity team on their seed funding! 🚀 It's been a big help for us at @CoderHQ and we appreciate what y'all are doing!

Josh Goldberg
Staff Developer at Codecademy
This is such a great idea & looks fantastic, congrats & good luck @feross + team!
The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Scott Roberts
CISO at UiPath
As a happy Socket customer, I've been impressed with how quickly they are adding value to the product, this move is a great step!

Yan Zhu
Head of Security at Brave, DEFCON, EFF, W3C
glad to hear some of the smartest people i know are working on (npm, etc.) supply chain security finally :). @SocketSecurity

Andrew Peterson
CEO and Co-Founder at Signal Sciences (acq. Fastly)
How do you track the validity of open source software libraries as they get updated? You're prob not. Check out @SocketSecurity and the updated tooling they launched.
Supply chain is a cluster in security as we all know and the tools from Socket are "duh" type tools to be implementing. Check them out and follow Feross Aboukhadijeh to see more updates coming from them in the future.

Zbyszek Tenerowicz
Senior Security Engineer at ConsenSys
socket.dev is getting more appealing by the hour

Devdatta Akhawe
Head of Security at Figma
The @SocketSecurity team is on fire! Amazing progress and I am exciting to see where they go next.

Sebastian Bensusan
Engineer Manager at Stripe
I find it surprising that we don't have _more_ supply chain attacks in software:
Imagine your airplane (the code running) was assembled (deployed) daily, with parts (dependencies) from internet strangers. How long until you get a bad part?
Excited for Socket to prevent this

Adam Baldwin
VP of Security at npm, Red Team at Auth0/Okta
Congrats to everyone at @SocketSecurity ❤️🤘🏻

Nico Waisman
CISO at Lyft
This is an area that I have personally been very focused on. As Nat Friedman said in the 2019 GitHub Universe keynote, Open Source won, and every time you add a new open source project you rely on someone else code and you rely on the people that build it.
This is both exciting and problematic. You are bringing real risk into your organization, and I'm excited to see progress in the industry from OpenSSF scorecards and package analyzers to the company that Feross Aboukhadijeh is building!
Depend on Socket to prevent malicious open source dependencies from infiltrating your app.
Install the Socket GitHub App in just 2 clicks and get protected today.
Block 70+ issues in open source code, including malware, typo-squatting, hidden code, misleading packages, permission creep, and more.
Reduce work by surfacing actionable security information directly in GitHub. Empower developers to make better decisions.
Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.
Dec 14, 2023
Hijacked cryptocurrency library adds malware
Widely-used library in cryptocurrency frontend was compromised to include wallet-draining code, following the hijacking of NPM account credentials via phishing.
Jan 06, 2022
Maintainer intentionally adds malware
Rogue maintainer sabotages his own open source package with 100M downloads/month, notably breaking Amazon's AWS SDK.
Nov 15, 2021
npm discovers a platform vulnerability allowing unauthorized publishing of any package
Attackers could publish new versions of any npm package without authorization for multiple years.
Oct 22, 2021
Hijacked package adds cryptominers and password-stealing malware
Multiple packages with 30M downloads/month are hijacked and publish malicious versions directly into the software supply chain.
Nov 26, 2018
Package hijacked adding organization specific backdoors
Obfuscated malware added to a dependency which targeted a single company, went undetected for over a week, and made it into their production build.
Get our latest security research, open source insights, and product updates.

Security News
Deno 2.6 introduces deno audit with a new --socket flag that plugs directly into Socket to bring supply chain security checks into the Deno CLI.

Security News
New DoS and source code exposure bugs in React Server Components and Next.js: what’s affected and how to update safely.

Security News
Socket CEO Feross Aboukhadijeh joins Software Engineering Daily to discuss modern software supply chain attacks and rising AI-driven security risks.