Launch Week Day 5: Introducing Reachability for PHP.Learn More
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.5

We protect you from vulnerable and malicious packages

n8n-nodes-thong-zalo-test-trial

0.0.86

by vanthong0404

Live on npm

Blocked by Socket

This code automatically creates credentials in an n8n instance and then forwards user-identifying information (CustomerID, DisplayName, PhoneNumber) and the newly created credential ID to an external endpoint (paradisehrm.com). It also contains a hardcoded username and long password-like string used when posting to that external endpoint and prints API key fragments to logs. These behaviors strongly resemble unauthorized data exfiltration or at minimum a privacy-violating integration that embeds static secrets. I recommend treating this code as suspicious: remove or audit the external POST to paradisehrm.com, remove embedded secrets, and ensure any credential provisioning and data sharing is explicit and documented.

ebesha-core-engine

0.1.11

Live on pypi

Blocked by Socket

This module is not obviously malware (no network exfiltration, shells, or obfuscation) but contains multiple severe security issues: pervasive dynamic SQL construction without safe parameterization and direct execution of externally-supplied SQL (report_data.function) create high risk of SQL injection and arbitrary query execution. The get_custom_datas function contains large malformed code fragments which are suspicious and indicate either repository corruption or a hidden/modified payload; this should be investigated. Overall: not malicious by intent based on available code, but poses a significant security risk and should NOT be trusted in environments processing untrusted input without code fixes (use parameterized queries, validate report SQL, remove/repair malformed code, and audit logging).

plengauer/thoth

b6f5795c439b5d52c2454b6ddd9a22a62845f7f9

Live on actions

Blocked by Socket

The code is a high-risk auto-installer that automatically fetches and installs a binary package from external sources without verifying integrity or provenance. While this behavior could be legitimate in controlled environments, it constitutes a significant supply-chain risk due to potential tampering, dependency confusion, or redirection to malicious payloads. The insecure temporary file handling (mktemp -u) and absence of validation further amplify risk. Recommend prohibiting automatic remote installation in public packages, requiring cryptographic verification, version pinning, and user-confirmed installations.

@zpmc/cli-wd

0.0.6-beta.3

by boat3471

Live on npm

Blocked by Socket

This module implements a high-impact supply-chain/persistence pattern: it overwrites the globally installed npm CLI entrypoint to require and execute a hook module it writes into the global npm installation tree, calling zpmc.before()/zpmc.after(...) on future npm runs. While the snippet does not show the hook’s internal behavior, the injection and persistence mechanism is strongly consistent with malicious tampering risk. Registry switching further increases potential for dependency redirection. Only the generated template/hook contents (../zpmc/npm.js) would confirm the exact maliciousness.

arccyouxi

1.0.0

by qingjiuzhisi

Live on npm

Blocked by Socket

No malicious behavior detected. This is a standard Webpack CSS loader helper used in Vue projects. Security risk is low, with attention to ensuring build-time configuration and environment access remain controlled. Confidence: high for correctness of assessment given code context.

imagecomponents.mvc.imaging

4.0.4.2

by Image Components

Live on nuget

Blocked by Socket

This module exhibits multiple strong indicators of malicious behavior: heavy obfuscation, embedded encrypted payloads with hardcoded AES key/IV, RSA/Hash verification logic, runtime decryption of resources, use of kernel32 native APIs (VirtualAlloc/WriteProcessMemory/VirtualProtect/OpenProcess/LoadLibrary/GetProcAddress) via delegates, writing/executing memory and dynamic method trampolines. The code flows read encrypted resources -> decrypt -> allocate/write executable memory -> change protections -> prepare/invoke delegates — consistent with an in-memory loader/reflective DLL injector or shellcode runner. I assess this as malicious and high risk: do not run or include in trusted builds. If you found this in a dependency, remove it and investigate upstream source and compromise.

github.com/sourcegraph/sourcegraph

v0.0.0-20210609171406-6a85754c3d5c

Live on go

Blocked by Socket

This module is a purpose-built destructive utility: given a user-supplied directory, it enumerates all files ending in .zip and corrupts them by truncating them to half their size and appending deterministic junk data. The absence of safeguards (dry-run/confirmation/allowlists) and the deliberate sabotage operations make this strongly indicative of malicious intent within a supply-chain context, even though it does not show typical malware capabilities like networking or data exfiltration.

ac-appleicons

1.0.685

by haplicons

Removed from npm

Blocked by Socket

The code exhibits malicious behavior by sending environment variables to a remote server, which can lead to data theft. The domain used is obfuscated, indicating an attempt to hide the true destination.

Live on npm for 26 minutes before removal. Socket users were protected even while the package was live.

mtxcli

0.0.146

Removed from pypi

Blocked by Socket

The code contains several security risks, including uninitialized variables, hardcoded credentials, and the potential for unauthorized access through SSH. Proper validation and error handling are lacking, which could lead to exploitation. The overall risk and malware scores reflect these concerns.

Live on pypi for 117 days, 8 hours and 24 minutes before removal. Socket users were protected even while the package was live.

@a5c-ai/babysitter-openclaw

5.0.1-staging.37ca18bd

by tmuskal

Live on npm

Blocked by Socket

This code establishes a strong supply-chain/sandbox-break capability by executing a local bash hook at session start and directly passing both serialized caller context (stdin) and essentially the full parent environment (env) to that script, while also suppressing errors. While the snippet itself shows no explicit malicious behavior beyond delegation, the data exposure (context + process.env) and silent error handling make this pattern high-risk and warrant review of the hooks/babysitter-proxied-session-start.sh behavior.

lipo

1.0.1

by niftylettuce

Live on npm

Blocked by Socket

This file implements a malicious supply chain attack that masquerades as a local image processing library while actually exfiltrating user files and data to remote servers. The code mimics the Sharp library API to deceive users into unknowingly transmitting potentially sensitive image data externally. All image processing operations (resize, crop, format conversion, etc.) are queued and sent to external endpoints at api[.]lipo[.]io (or localhost:3000 in development mode). User files are streamed directly via fs.createReadStream() and buffer data is transmitted through FormData POST requests. The malicious code uses environment variables (LIPO_KEY) for API authentication and deliberately obscures the fact that no local processing occurs. Users calling standard image processing methods unknowingly send their data to third-party servers, making this a serious data exfiltration threat disguised as legitimate functionality.

fsd

0.1.179

Removed from pypi

Blocked by Socket

This module is not obviously containing intentionally hidden malware in itself (no obfuscation or hardcoded exfiltration), but it provides powerful primitives that make it high risk in a supply-chain context. The primary risks are arbitrary shell execution (subprocess.Popen with shell=True on external data) and unsanitized file writes (append to arbitrary paths). Combined with opaque external agents that produce steps and may perform network I/O, this creates a moderate-to-high security risk: an attacker who can influence step data, agent outputs, or stdin can execute commands, modify files, and potentially exfiltrate data. Strong mitigation (whitelisting allowed commands, validating file paths to restrict writes within repo, running with least privilege, auditing agent communications) is required before trusting this code in production.

Live on pypi for 5 days, 4 hours and 35 minutes before removal. Socket users were protected even while the package was live.

@asurion-core/eventualize-react-

99.0.1

by frankp89

Live on npm

Blocked by Socket

This code is malicious. It performs anti-debug/sandbox evasion and collects and exfiltrates sensitive data: environment variables (including tokens/keys), local secret files (.env, npmrc, shell configs), SSH private keys, Docker/Git configs, Kubernetes tokens/CA, and instance cloud credentials via metadata endpoints (IMDS/GCP/Azure). Network exfiltration occurs via https.request to an encoded remote endpoint with jittered chunking and retry logic.

metacord

1.2.1-Beta

by shinchan0911

Removed from npm

Blocked by Socket

The code contains several security risks including hardcoded credentials, lack of input validation, and potential for arbitrary code execution. It is advised to review and improve the security of the code before use.

Live on npm for 39 minutes before removal. Socket users were protected even while the package was live.

@0xbear/ibc-app-solidity-templatee

1.1.4

by 0xbear

Live on npm

Blocked by Socket

The script itself is not directly malicious: it contains typical build orchestration commands and no embedded credentials or network code. The critical supply-chain concerns are: (1) runtime download-and-execute of @latest via npx (remote code execution risk, non-deterministic), (2) execution of local opaque scripts and npm-defined scripts without integrity checks, and (3) destructive -D behavior in the transpiler. Recommend pinning tool versions, verifying checksums/signatures, auditing patch-apply.sh and npm scripts, disabling verbose logging in CI (remove set -x), and avoiding running npx@latest in high-threat environments without verification. Overall, low probability this file alone is malicious but moderate security risk due to executed external components.

github.com/yaklang/yaklang

v1.2.7-0.20230926065451-fe58010f9b26

Live on go

Blocked by Socket

This Go source contains routines that speak the T3 protocol to connect to Oracle WebLogic servers and deploy a serialized-Java RMI backdoor. It checks for the presence of a class named “com.supeream.payload,” installs a malicious payload if absent, then invokes arbitrary OS commands on the target and can clean up the backdoor afterward. Payload templates reference a default endpoint t3://47[.]104[.]229[.]232:7001, which is dynamically replaced with the victim IP/port. The hex-encoded Java object streams hide the backdoor installer/uninstaller and command execution logic, representing a high-severity malware threat.

prompt-siren

0.0.1a2

Live on pypi

Blocked by Socket

This source implements a deliberately labeled 'file exfiltration' HTTPS server: it accepts unauthenticated HTTP requests over TLS, logs request contents and client addresses to a root-owned log file and stderr, and is configured with hardcoded certificate and private key paths. The code is highly suspicious and appears intentionally designed to receive and persist exfiltrated data. Treat as malicious; do not deploy. If encountered in a repository or system, perform incident response: determine origin, check for matching network listeners, validate presence of the referenced cert/key, and inspect /logs/access.log for exfiltrated content and indexing of clients.

insta-api-wrapper

1.0.0

by dave7117

Live on npm

Blocked by Socket

The getCookies function performs a normal Instagram login by fetching CSRF cookies and posting credentials to i[.]instagram[.]com/api/v1/accounts/login/. Immediately afterward, it unconditionally POSTs a JSON payload containing the supplied username, plaintext password, serialized request body, and response body to https[:]//reelsaver[.]appit-online[.]de/v2/insta/check, enabling remote credential harvesting. It also persists instaUserName and instaUserId to disk via node-localstorage, facilitating victim identification. This behavior constitutes a backdoor/data exfiltration channel — do not use this code with real credentials; rotate any impacted passwords.

decentrand

3.21.0

by u3jwq2jts4sbf

Live on npm

Blocked by Socket

The package contains heavily obfuscated code that interacts with an Ethereum smart contract to retrieve data used in constructing a download URL specific to the user's operating system. Without user consent or validation, the code downloads an executable file from this URL and executes it in the background. This behavior allows for the execution of malicious code on the user's system.

github.com/bishopfox/sliver

v1.5.40-0.20240510143113-b520eaf6e63f

Live on go

Blocked by Socket

This file is part of a C2/implant framework (Sliver) and explicitly builds, retrieves, and delivers shellcode and in-memory assemblies to remote implants. Behavior includes generation of payloads, optional encoding, and remote invocation via GenericHandler — all actions that enable unauthorized remote code execution and post-exploitation operations. There are also lower-severity implementation issues (insufficient bounds checking in PE parsing and use of Fatal on parsing errors). If present in a dependency for benign software, this is a severe supply-chain red flag. Use is appropriate only in controlled/authorized contexts.

354766/pjt222/development-guides/manage-kubernetes-secrets/

1adceb952193d3bb257c4b479108cfe5846f9279

Live on socket

Blocked by Socket

This skill/instruction set is a legitimate, operational guide for Kubernetes secrets management. It contains standard high-privilege operations (etcd access, KMS integration, IAM role creation, installing cluster controllers) and remote downloads of controller manifests and CLI binaries. The primary risks are operational/supply-chain: executing remote manifests and binaries without verification, running high-privilege commands, and the possibility that operators copy example plaintext secrets or unsecured backups into version control. There is no evidence in the provided content of deliberate credential harvesting, backdoors, obfuscation, or exfiltration to attacker-controlled domains. Recommended mitigations: pin and verify downloaded artifacts (use checksums or signed releases), avoid committing plaintext secrets or backups to Git, apply least-privilege IAM/RBAC policies, audit third-party controllers before installation, and restrict etcd access.

sbcli-iscsi

0.0.1

Live on pypi

Blocked by Socket

No direct malware code is present in the fragment (no obvious backdoor, reverse shell, or exfiltration implemented in this file itself). However, the module exposes very high-risk functionality: it connects to the Docker API over plaintext TCP, allows client-controlled image pulls and runs containers as privileged with host mounts and host networking, and injects potentially sensitive credentials into container environments. These behaviors make this code a significant supply-chain and host compromise risk if the endpoints are reachable by untrusted users or if DOCKER_IP/docker daemon is exposed. Recommend restricting access, enforcing authentication/authorization, validating image names (or disallowing arbitrary images), using TLS/auth for Docker daemon, removing privileged/host_mode mounts where possible, and avoiding passing untrusted secrets into container environments.

mark-test1

0.6.35

by mark.mathiasz

Live on npm

Blocked by Socket

This preinstall script is suspicious and high-risk: it escapes the package directory and runs npm install in the ancestor directory, causing installation and execution of code in the parent project. This can lead to untrusted code execution, unexpected modifications to the consumer project, and supply-chain abuse. The dependency specs themselves are normal semver versions, but the lifecycle behavior warrants treating this package as malware/hostile or at least highly risky.

capesolo

0.4.6

Live on pypi

Blocked by Socket

This module contains multiple high-risk behaviors consistent with tools intended to evade detection and modify system identity and state: changing MachineGuid/ProductId, modifying Office security and MRU entries, masking virtualization indicators, attempting system-level execution via psexec, and adding persistent routes. While not showing explicit data exfiltration or a remote backdoor in this fragment, the operations are commonly used by malware for persistence, anti-analysis, and anti-forensics. Treat this package as malicious or highly dangerous unless you have a verified, legitimate, documented use-case and strict controls.

n8n-nodes-thong-zalo-test-trial

0.0.86

by vanthong0404

Live on npm

Blocked by Socket

This code automatically creates credentials in an n8n instance and then forwards user-identifying information (CustomerID, DisplayName, PhoneNumber) and the newly created credential ID to an external endpoint (paradisehrm.com). It also contains a hardcoded username and long password-like string used when posting to that external endpoint and prints API key fragments to logs. These behaviors strongly resemble unauthorized data exfiltration or at minimum a privacy-violating integration that embeds static secrets. I recommend treating this code as suspicious: remove or audit the external POST to paradisehrm.com, remove embedded secrets, and ensure any credential provisioning and data sharing is explicit and documented.

ebesha-core-engine

0.1.11

Live on pypi

Blocked by Socket

This module is not obviously malware (no network exfiltration, shells, or obfuscation) but contains multiple severe security issues: pervasive dynamic SQL construction without safe parameterization and direct execution of externally-supplied SQL (report_data.function) create high risk of SQL injection and arbitrary query execution. The get_custom_datas function contains large malformed code fragments which are suspicious and indicate either repository corruption or a hidden/modified payload; this should be investigated. Overall: not malicious by intent based on available code, but poses a significant security risk and should NOT be trusted in environments processing untrusted input without code fixes (use parameterized queries, validate report SQL, remove/repair malformed code, and audit logging).

plengauer/thoth

b6f5795c439b5d52c2454b6ddd9a22a62845f7f9

Live on actions

Blocked by Socket

The code is a high-risk auto-installer that automatically fetches and installs a binary package from external sources without verifying integrity or provenance. While this behavior could be legitimate in controlled environments, it constitutes a significant supply-chain risk due to potential tampering, dependency confusion, or redirection to malicious payloads. The insecure temporary file handling (mktemp -u) and absence of validation further amplify risk. Recommend prohibiting automatic remote installation in public packages, requiring cryptographic verification, version pinning, and user-confirmed installations.

@zpmc/cli-wd

0.0.6-beta.3

by boat3471

Live on npm

Blocked by Socket

This module implements a high-impact supply-chain/persistence pattern: it overwrites the globally installed npm CLI entrypoint to require and execute a hook module it writes into the global npm installation tree, calling zpmc.before()/zpmc.after(...) on future npm runs. While the snippet does not show the hook’s internal behavior, the injection and persistence mechanism is strongly consistent with malicious tampering risk. Registry switching further increases potential for dependency redirection. Only the generated template/hook contents (../zpmc/npm.js) would confirm the exact maliciousness.

arccyouxi

1.0.0

by qingjiuzhisi

Live on npm

Blocked by Socket

No malicious behavior detected. This is a standard Webpack CSS loader helper used in Vue projects. Security risk is low, with attention to ensuring build-time configuration and environment access remain controlled. Confidence: high for correctness of assessment given code context.

imagecomponents.mvc.imaging

4.0.4.2

by Image Components

Live on nuget

Blocked by Socket

This module exhibits multiple strong indicators of malicious behavior: heavy obfuscation, embedded encrypted payloads with hardcoded AES key/IV, RSA/Hash verification logic, runtime decryption of resources, use of kernel32 native APIs (VirtualAlloc/WriteProcessMemory/VirtualProtect/OpenProcess/LoadLibrary/GetProcAddress) via delegates, writing/executing memory and dynamic method trampolines. The code flows read encrypted resources -> decrypt -> allocate/write executable memory -> change protections -> prepare/invoke delegates — consistent with an in-memory loader/reflective DLL injector or shellcode runner. I assess this as malicious and high risk: do not run or include in trusted builds. If you found this in a dependency, remove it and investigate upstream source and compromise.

github.com/sourcegraph/sourcegraph

v0.0.0-20210609171406-6a85754c3d5c

Live on go

Blocked by Socket

This module is a purpose-built destructive utility: given a user-supplied directory, it enumerates all files ending in .zip and corrupts them by truncating them to half their size and appending deterministic junk data. The absence of safeguards (dry-run/confirmation/allowlists) and the deliberate sabotage operations make this strongly indicative of malicious intent within a supply-chain context, even though it does not show typical malware capabilities like networking or data exfiltration.

ac-appleicons

1.0.685

by haplicons

Removed from npm

Blocked by Socket

The code exhibits malicious behavior by sending environment variables to a remote server, which can lead to data theft. The domain used is obfuscated, indicating an attempt to hide the true destination.

Live on npm for 26 minutes before removal. Socket users were protected even while the package was live.

mtxcli

0.0.146

Removed from pypi

Blocked by Socket

The code contains several security risks, including uninitialized variables, hardcoded credentials, and the potential for unauthorized access through SSH. Proper validation and error handling are lacking, which could lead to exploitation. The overall risk and malware scores reflect these concerns.

Live on pypi for 117 days, 8 hours and 24 minutes before removal. Socket users were protected even while the package was live.

@a5c-ai/babysitter-openclaw

5.0.1-staging.37ca18bd

by tmuskal

Live on npm

Blocked by Socket

This code establishes a strong supply-chain/sandbox-break capability by executing a local bash hook at session start and directly passing both serialized caller context (stdin) and essentially the full parent environment (env) to that script, while also suppressing errors. While the snippet itself shows no explicit malicious behavior beyond delegation, the data exposure (context + process.env) and silent error handling make this pattern high-risk and warrant review of the hooks/babysitter-proxied-session-start.sh behavior.

lipo

1.0.1

by niftylettuce

Live on npm

Blocked by Socket

This file implements a malicious supply chain attack that masquerades as a local image processing library while actually exfiltrating user files and data to remote servers. The code mimics the Sharp library API to deceive users into unknowingly transmitting potentially sensitive image data externally. All image processing operations (resize, crop, format conversion, etc.) are queued and sent to external endpoints at api[.]lipo[.]io (or localhost:3000 in development mode). User files are streamed directly via fs.createReadStream() and buffer data is transmitted through FormData POST requests. The malicious code uses environment variables (LIPO_KEY) for API authentication and deliberately obscures the fact that no local processing occurs. Users calling standard image processing methods unknowingly send their data to third-party servers, making this a serious data exfiltration threat disguised as legitimate functionality.

fsd

0.1.179

Removed from pypi

Blocked by Socket

This module is not obviously containing intentionally hidden malware in itself (no obfuscation or hardcoded exfiltration), but it provides powerful primitives that make it high risk in a supply-chain context. The primary risks are arbitrary shell execution (subprocess.Popen with shell=True on external data) and unsanitized file writes (append to arbitrary paths). Combined with opaque external agents that produce steps and may perform network I/O, this creates a moderate-to-high security risk: an attacker who can influence step data, agent outputs, or stdin can execute commands, modify files, and potentially exfiltrate data. Strong mitigation (whitelisting allowed commands, validating file paths to restrict writes within repo, running with least privilege, auditing agent communications) is required before trusting this code in production.

Live on pypi for 5 days, 4 hours and 35 minutes before removal. Socket users were protected even while the package was live.

@asurion-core/eventualize-react-

99.0.1

by frankp89

Live on npm

Blocked by Socket

This code is malicious. It performs anti-debug/sandbox evasion and collects and exfiltrates sensitive data: environment variables (including tokens/keys), local secret files (.env, npmrc, shell configs), SSH private keys, Docker/Git configs, Kubernetes tokens/CA, and instance cloud credentials via metadata endpoints (IMDS/GCP/Azure). Network exfiltration occurs via https.request to an encoded remote endpoint with jittered chunking and retry logic.

metacord

1.2.1-Beta

by shinchan0911

Removed from npm

Blocked by Socket

The code contains several security risks including hardcoded credentials, lack of input validation, and potential for arbitrary code execution. It is advised to review and improve the security of the code before use.

Live on npm for 39 minutes before removal. Socket users were protected even while the package was live.

@0xbear/ibc-app-solidity-templatee

1.1.4

by 0xbear

Live on npm

Blocked by Socket

The script itself is not directly malicious: it contains typical build orchestration commands and no embedded credentials or network code. The critical supply-chain concerns are: (1) runtime download-and-execute of @latest via npx (remote code execution risk, non-deterministic), (2) execution of local opaque scripts and npm-defined scripts without integrity checks, and (3) destructive -D behavior in the transpiler. Recommend pinning tool versions, verifying checksums/signatures, auditing patch-apply.sh and npm scripts, disabling verbose logging in CI (remove set -x), and avoiding running npx@latest in high-threat environments without verification. Overall, low probability this file alone is malicious but moderate security risk due to executed external components.

github.com/yaklang/yaklang

v1.2.7-0.20230926065451-fe58010f9b26

Live on go

Blocked by Socket

This Go source contains routines that speak the T3 protocol to connect to Oracle WebLogic servers and deploy a serialized-Java RMI backdoor. It checks for the presence of a class named “com.supeream.payload,” installs a malicious payload if absent, then invokes arbitrary OS commands on the target and can clean up the backdoor afterward. Payload templates reference a default endpoint t3://47[.]104[.]229[.]232:7001, which is dynamically replaced with the victim IP/port. The hex-encoded Java object streams hide the backdoor installer/uninstaller and command execution logic, representing a high-severity malware threat.

prompt-siren

0.0.1a2

Live on pypi

Blocked by Socket

This source implements a deliberately labeled 'file exfiltration' HTTPS server: it accepts unauthenticated HTTP requests over TLS, logs request contents and client addresses to a root-owned log file and stderr, and is configured with hardcoded certificate and private key paths. The code is highly suspicious and appears intentionally designed to receive and persist exfiltrated data. Treat as malicious; do not deploy. If encountered in a repository or system, perform incident response: determine origin, check for matching network listeners, validate presence of the referenced cert/key, and inspect /logs/access.log for exfiltrated content and indexing of clients.

insta-api-wrapper

1.0.0

by dave7117

Live on npm

Blocked by Socket

The getCookies function performs a normal Instagram login by fetching CSRF cookies and posting credentials to i[.]instagram[.]com/api/v1/accounts/login/. Immediately afterward, it unconditionally POSTs a JSON payload containing the supplied username, plaintext password, serialized request body, and response body to https[:]//reelsaver[.]appit-online[.]de/v2/insta/check, enabling remote credential harvesting. It also persists instaUserName and instaUserId to disk via node-localstorage, facilitating victim identification. This behavior constitutes a backdoor/data exfiltration channel — do not use this code with real credentials; rotate any impacted passwords.

decentrand

3.21.0

by u3jwq2jts4sbf

Live on npm

Blocked by Socket

The package contains heavily obfuscated code that interacts with an Ethereum smart contract to retrieve data used in constructing a download URL specific to the user's operating system. Without user consent or validation, the code downloads an executable file from this URL and executes it in the background. This behavior allows for the execution of malicious code on the user's system.

github.com/bishopfox/sliver

v1.5.40-0.20240510143113-b520eaf6e63f

Live on go

Blocked by Socket

This file is part of a C2/implant framework (Sliver) and explicitly builds, retrieves, and delivers shellcode and in-memory assemblies to remote implants. Behavior includes generation of payloads, optional encoding, and remote invocation via GenericHandler — all actions that enable unauthorized remote code execution and post-exploitation operations. There are also lower-severity implementation issues (insufficient bounds checking in PE parsing and use of Fatal on parsing errors). If present in a dependency for benign software, this is a severe supply-chain red flag. Use is appropriate only in controlled/authorized contexts.

354766/pjt222/development-guides/manage-kubernetes-secrets/

1adceb952193d3bb257c4b479108cfe5846f9279

Live on socket

Blocked by Socket

This skill/instruction set is a legitimate, operational guide for Kubernetes secrets management. It contains standard high-privilege operations (etcd access, KMS integration, IAM role creation, installing cluster controllers) and remote downloads of controller manifests and CLI binaries. The primary risks are operational/supply-chain: executing remote manifests and binaries without verification, running high-privilege commands, and the possibility that operators copy example plaintext secrets or unsecured backups into version control. There is no evidence in the provided content of deliberate credential harvesting, backdoors, obfuscation, or exfiltration to attacker-controlled domains. Recommended mitigations: pin and verify downloaded artifacts (use checksums or signed releases), avoid committing plaintext secrets or backups to Git, apply least-privilege IAM/RBAC policies, audit third-party controllers before installation, and restrict etcd access.

sbcli-iscsi

0.0.1

Live on pypi

Blocked by Socket

No direct malware code is present in the fragment (no obvious backdoor, reverse shell, or exfiltration implemented in this file itself). However, the module exposes very high-risk functionality: it connects to the Docker API over plaintext TCP, allows client-controlled image pulls and runs containers as privileged with host mounts and host networking, and injects potentially sensitive credentials into container environments. These behaviors make this code a significant supply-chain and host compromise risk if the endpoints are reachable by untrusted users or if DOCKER_IP/docker daemon is exposed. Recommend restricting access, enforcing authentication/authorization, validating image names (or disallowing arbitrary images), using TLS/auth for Docker daemon, removing privileged/host_mode mounts where possible, and avoiding passing untrusted secrets into container environments.

mark-test1

0.6.35

by mark.mathiasz

Live on npm

Blocked by Socket

This preinstall script is suspicious and high-risk: it escapes the package directory and runs npm install in the ancestor directory, causing installation and execution of code in the parent project. This can lead to untrusted code execution, unexpected modifications to the consumer project, and supply-chain abuse. The dependency specs themselves are normal semver versions, but the lifecycle behavior warrants treating this package as malware/hostile or at least highly risky.

capesolo

0.4.6

Live on pypi

Blocked by Socket

This module contains multiple high-risk behaviors consistent with tools intended to evade detection and modify system identity and state: changing MachineGuid/ProductId, modifying Office security and MRU entries, masking virtualization indicators, attempting system-level execution via psexec, and adding persistent routes. While not showing explicit data exfiltration or a remote backdoor in this fragment, the operations are commonly used by malware for persistence, anti-analysis, and anti-forensics. Treat this package as malicious or highly dangerous unless you have a verified, legitimate, documented use-case and strict controls.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Git dependency

GitHub dependency

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

Telemetry

Protestware or potentially unwanted behavior

Unstable ownership

55 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a Demo

Questions? Call us at (844) SOCKET-0

Read the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles