Launch Week Day 5: Introducing Reachability for PHP.Learn More
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.5

We protect you from vulnerable and malicious packages

react-dom-19

1.0.0

by mostwantedbythecia

Removed from npm

Blocked by Socket

Highly suspicious: the module collects local username and hostname and exfiltrates them via an outbound DNS lookup to a hardcoded OAST-style domain (`*.oast.fun`) by embedding the values into the queried subdomain. This is consistent with covert data leakage and out-of-band signaling. Treat as malicious/unsafe.

Live on npm for 2 days and 17 hours before removal. Socket users were protected even while the package was live.

iis-bridge

0.9

Live on pypi

Blocked by Socket

This module is a clear HTTP flooding/denial-of-service tool: it constructs and runs many threads to open HTTP connections to arbitrary, caller-specified URLs at a configurable high rate. It lacks any safety checks, validation, or consent mechanisms. The supplied snippet is also syntactically incomplete (truncated exception handler), showing poor code quality or an incomplete sample. Because the code enables abusive network activity and resource exhaustion, it represents a high security risk and should not be included or executed in trusted systems. Treat as malicious/abusive tooling unless explicit, auditable intent and safeguards are documented and enforced.

devious-winrm

1.2.2

Live on pypi

Blocked by Socket

This file programmatically builds and runs highly obfuscated PowerShell payloads that disable the Windows Antimalware Scan Interface (AMSI) and patch Event Tracing for Windows (ETW). It reads external templates (AMSI-Bypass.ps1.template and ETW-Patch.ps1.template), injects randomized function and variable names, converts each string literal into arithmetic character/byte expressions (e.g., [Char](value–rand) or [Char]([Byte] …)), and randomizes keyword casing to evade signature-based detection. The assembled scripts are executed via get_command_output on a supplied SyncRunspacePool (remote PowerShell runspace) without any authorization or safety checks. Originates from code derived from github[.]com/Hackplayers/evil-winrm. Such behavior—stealthily disabling endpoint defenses—is characteristic of malware and poses a critical security risk.

@muya-ui/core

0.4.0-alpha.9

by yuck

Live on npm

Blocked by Socket

The source code contains a malicious backdoor that stealthily exfiltrates sensitive git repository information and package version to a suspicious external server. This represents a high security risk and a serious supply chain compromise. Immediate removal or remediation of this code is strongly recommended.

ctyun-keeplive

0.1.1

Live on pypi

Blocked by Socket

This code fragment is highly indicative of credential/session artifact harvesting for an authenticated “desktop connect” flow. It injects browser hooks to capture targeted POST request headers (ctg-*), collects device fingerprint data, and persists these along with auth.secretKey to a local JSON file. The combination of targeted endpoint interception, device fingerprinting, secretKey persistence, and verification automation components (OCR/Telegram support) presents a serious supply-chain security risk and warrants strict avoidance/review when included as a dependency.

genki-analytics

1.0.0

by kakashi1337

Live on npm

Blocked by Socket

This code functions as a malicious browser agent/backdoor designed for reconnaissance, credential/token harvesting, active exploitation (XSS/CSP/postMessage), persistence via service worker and storage, and remote command-and-control via WebSockets. It includes anti-analysis measures and social-engineering UI to prompt extension installation. It should be considered malicious and dangerous; do not deploy or include in production. Immediate remediation: remove package, revoke any installed service-workers/local storage entries, rotate any exposed credentials, and investigate network connections to the configured C2/WS endpoints.

sbcli-lvol-ha

0.6.3

Live on pypi

Blocked by Socket

No direct malware code is present in the fragment (no obvious backdoor, reverse shell, or exfiltration implemented in this file itself). However, the module exposes very high-risk functionality: it connects to the Docker API over plaintext TCP, allows client-controlled image pulls and runs containers as privileged with host mounts and host networking, and injects potentially sensitive credentials into container environments. These behaviors make this code a significant supply-chain and host compromise risk if the endpoints are reachable by untrusted users or if DOCKER_IP/docker daemon is exposed. Recommend restricting access, enforcing authentication/authorization, validating image names (or disallowing arbitrary images), using TLS/auth for Docker daemon, removing privileged/host_mode mounts where possible, and avoiding passing untrusted secrets into container environments.

@remote-components/client

0.0.9

by lucagez

Live on npm

Blocked by Socket

This module is a high-severity supply-chain/client-compromise risk. It retrieves JavaScript from a caller-specified URL (or from cached content) and executes it via `eval` without integrity or sandboxing. The evaluated code can register components through exposed globals (`window.module`/`window.require`) and those components are rendered dynamically, enabling attacker-controlled behavior, UI hijacking, and potential data theft within the page context. Even absent explicit malicious intent, the capability is inherently dangerous and should be treated as an extreme security finding.

@payvo/sdk-eos

1.4.0

by faustbrian

Live on npm

Blocked by Socket

This code contains a critical supply chain attack. The broadcast method ignores user input and always executes a hardcoded cryptocurrency transfer before throwing a NotImplemented exception to hide the malicious behavior. Every application using this service will attempt unauthorized token transfers.

@dxa/dxa-ng-core-theme

1.7.0

by hardikdabhi

Live on npm

Blocked by Socket

This module enables high-severity client-side code execution: it fetches untrusted HTML as text, extracts embedded <script> contents, and executes them via eval(). It also renders untrusted HTML using DomSanitizer.bypassSecurityTrustHtml, bypassing Angular’s XSS defenses. Additional risk comes from dynamic router reconfiguration based on remote/local navigation data and from exposing callable methods on the global window object via JsBridge. Whether it is ‘malware’ depends on upstream trust and control, but the security risk is extremely high and warrants immediate review/containment (e.g., remove eval, enforce sanitization/allowlists, and add integrity controls).

mtmai

0.3.1554

Live on pypi

Blocked by Socket

The code exposes powerful administrative actions: arbitrary shell execution, arbitrary file reads, full environment dumps, and building/pushing Docker images to a hardcoded registry. These are not obfuscated but are high-risk capabilities that can be abused for data exfiltration, remote code execution, and supply-chain leakage if the superuser authentication is compromised or misconfigured. The presence of a hardcoded remote image name for docker push is suspicious for unintended outbound artifact exfiltration. Recommendation: avoid including these endpoints in public packages or ensure strict, auditable authentication and input validation; remove hardcoded push targets and avoid returning full environment variables or arbitrary file contents.

github.com/milvus-io/milvus

v0.10.3-0.20211001233336-b127a0d44f48

Live on go

Blocked by Socket

This code implements an insecure, unauthenticated RPC mechanism that allows remote clients to cause arbitrary code execution and exfiltrate files/system information. Using pickle over an untrusted network and invoking methods by client-supplied names are severe supply-chain/backdoor risks. Do not deploy or reuse this code in production; it should be treated as a backdoor/untrusted remote-execution component unless wrapped with strong authentication, authorization, sandboxing, and safe serialization.

bincode

0.0.0-publish-bincode-package-202512311440

by ahmed--ali

Removed from npm

Blocked by Socket

This package will execute arbitrary JavaScript from its bundled postinstall.mjs during installation (via bun or node). That behavior is potentially dangerous because the script can perform filesystem changes, network calls, spawn processes, or install persistent hooks. Treat this as a moderate-to-high security risk until you review the contents of postinstall.mjs (and any scripts it loads or downloads) and the ./bin/bincode executable.

Live on npm for 5 hours and 3 minutes before removal. Socket users were protected even while the package was live.

abianbiya/laralag

0.2.1

Live on composer

Blocked by Socket

The analyzed source code is primarily a legitimate implementation of the SweetAlert2 modal popup library. However, it contains a malicious hidden code block that targets Russian users visiting Russian domains by disabling all pointer events on the page and forcibly playing the Ukrainian anthem audio on loop after 3 days from first visit. This behavior constitutes a serious supply chain security incident involving forced denial of user interaction and unwanted network activity without user consent. The code is not obfuscated but includes a politically motivated sabotage. Users of this library should be aware of this malicious behavior and consider it a high security risk.

ctf-payload

1.0.21

by duonghello

Live on npm

Blocked by Socket

This snippet performs direct exfiltration of authenticated page content to a hardcoded external webhook. It is high risk and likely malicious or at minimum a severe privacy bug / accidental data leak. Treat as a security incident: remove the code, investigate its introduction, rotate exposed credentials/session tokens, and block the external destination.

vite-plugin-config-helper

0.2.23

by frontgao

Live on npm

Blocked by Socket

This code represents an intrusive scaffolding/config-helper plugin that can dramatically alter a project’s structure, configuration, and dependencies based on decrypted embedded assets and registry data. While it could be legitimate for tightly controlled templating workflows, the presence of hard-coded cryptographic keys, automatic generation of core config, and dynamic dependency rewriting raise substantial supply-chain and runtime integrity concerns. Without clear provenance, user consent, and robust validation of decrypted payloads, this code should be treated as high-risk for any ecosystem where integrity is critical.

pyopenrpa

1.4.0

Live on pypi

Blocked by Socket

The code contains a security risk due to the lack of input validation and sanitization, potentially leading to unauthorized actions or misuse. There are no clear indications of obfuscation or malware in this code.

fsd

0.1.199

Removed from pypi

Blocked by Socket

This module itself does not contain obvious obfuscated malware (no encoded payloads, hardcoded secrets, network exfiltration code). However it provides powerful primitives (subprocess with shell=True, ability to change directories, write files and open OS terminals) that allow arbitrary code execution and file modification when given untrusted inputs (steps_json, user inputs, or compromised upstream agents). Therefore the package is high-risk in supply-chain contexts: if an upstream component or dependency is malicious, this code can be used to execute arbitrary commands on the host. Use only with trusted inputs and add sanitization and restrictions before use.

Live on pypi for 5 days, 5 hours and 48 minutes before removal. Socket users were protected even while the package was live.

354766/zainhas/togetherai-skills/together-audio/

c4cad3fad673d968c3afd6fc5058ce3ae850e461

Live on socket

Blocked by Socket

The fragment is a legitimate usage guide for Together AI's TTS/STT capabilities and does not present malicious behavior within the provided scope. The primary risks are typical for API documentation: exposure of API keys in examples and data transmitted to external endpoints; no evidence of hidden payloads, credential harvesting, or autonomous actions. Overall security risk is low-to-moderate due to potential misuse of API keys in shared contexts; ensure proper secret management and adherence to least-privilege access when integrating.

aizhen.aizhensoft.common.clearscript

2.0.5.15

by AiZhen

Live on nuget

Blocked by Socket

This assembly contains strongly suspicious behavior: obfuscated unpacking/decryption of embedded resources and use of Windows native APIs (VirtualAlloc/WriteProcessMemory/OpenProcess/VirtualProtect/LoadLibrary/GetProcAddress) capable of injecting or loading code at runtime. It also embeds symmetric key material and performs runtime RSA operations and integrity checks. While there are benign utility classes for ClearScript, the presence of a decryption + native memory write + dynamic delegate creation pattern matches a loader/injector and presents a high supply-chain risk. I recommend blocking or isolating this package and performing deeper dynamic analysis in a sandbox. Treat as potentially malicious.

nodejsandnpm

10.0.1

by , Node.js Foundation

Live on nuget

Blocked by Socket

The source code contains potential security risks, particularly related to command execution and unsafe permissions. Proper validation and sanitization of inputs are crucial to mitigate these risks. The overall assessment indicates a moderate level of concern regarding security.

react-dom-19

1.0.0

by mostwantedbythecia

Removed from npm

Blocked by Socket

Highly suspicious: the module collects local username and hostname and exfiltrates them via an outbound DNS lookup to a hardcoded OAST-style domain (`*.oast.fun`) by embedding the values into the queried subdomain. This is consistent with covert data leakage and out-of-band signaling. Treat as malicious/unsafe.

Live on npm for 2 days and 17 hours before removal. Socket users were protected even while the package was live.

iis-bridge

0.9

Live on pypi

Blocked by Socket

This module is a clear HTTP flooding/denial-of-service tool: it constructs and runs many threads to open HTTP connections to arbitrary, caller-specified URLs at a configurable high rate. It lacks any safety checks, validation, or consent mechanisms. The supplied snippet is also syntactically incomplete (truncated exception handler), showing poor code quality or an incomplete sample. Because the code enables abusive network activity and resource exhaustion, it represents a high security risk and should not be included or executed in trusted systems. Treat as malicious/abusive tooling unless explicit, auditable intent and safeguards are documented and enforced.

devious-winrm

1.2.2

Live on pypi

Blocked by Socket

This file programmatically builds and runs highly obfuscated PowerShell payloads that disable the Windows Antimalware Scan Interface (AMSI) and patch Event Tracing for Windows (ETW). It reads external templates (AMSI-Bypass.ps1.template and ETW-Patch.ps1.template), injects randomized function and variable names, converts each string literal into arithmetic character/byte expressions (e.g., [Char](value–rand) or [Char]([Byte] …)), and randomizes keyword casing to evade signature-based detection. The assembled scripts are executed via get_command_output on a supplied SyncRunspacePool (remote PowerShell runspace) without any authorization or safety checks. Originates from code derived from github[.]com/Hackplayers/evil-winrm. Such behavior—stealthily disabling endpoint defenses—is characteristic of malware and poses a critical security risk.

@muya-ui/core

0.4.0-alpha.9

by yuck

Live on npm

Blocked by Socket

The source code contains a malicious backdoor that stealthily exfiltrates sensitive git repository information and package version to a suspicious external server. This represents a high security risk and a serious supply chain compromise. Immediate removal or remediation of this code is strongly recommended.

ctyun-keeplive

0.1.1

Live on pypi

Blocked by Socket

This code fragment is highly indicative of credential/session artifact harvesting for an authenticated “desktop connect” flow. It injects browser hooks to capture targeted POST request headers (ctg-*), collects device fingerprint data, and persists these along with auth.secretKey to a local JSON file. The combination of targeted endpoint interception, device fingerprinting, secretKey persistence, and verification automation components (OCR/Telegram support) presents a serious supply-chain security risk and warrants strict avoidance/review when included as a dependency.

genki-analytics

1.0.0

by kakashi1337

Live on npm

Blocked by Socket

This code functions as a malicious browser agent/backdoor designed for reconnaissance, credential/token harvesting, active exploitation (XSS/CSP/postMessage), persistence via service worker and storage, and remote command-and-control via WebSockets. It includes anti-analysis measures and social-engineering UI to prompt extension installation. It should be considered malicious and dangerous; do not deploy or include in production. Immediate remediation: remove package, revoke any installed service-workers/local storage entries, rotate any exposed credentials, and investigate network connections to the configured C2/WS endpoints.

sbcli-lvol-ha

0.6.3

Live on pypi

Blocked by Socket

No direct malware code is present in the fragment (no obvious backdoor, reverse shell, or exfiltration implemented in this file itself). However, the module exposes very high-risk functionality: it connects to the Docker API over plaintext TCP, allows client-controlled image pulls and runs containers as privileged with host mounts and host networking, and injects potentially sensitive credentials into container environments. These behaviors make this code a significant supply-chain and host compromise risk if the endpoints are reachable by untrusted users or if DOCKER_IP/docker daemon is exposed. Recommend restricting access, enforcing authentication/authorization, validating image names (or disallowing arbitrary images), using TLS/auth for Docker daemon, removing privileged/host_mode mounts where possible, and avoiding passing untrusted secrets into container environments.

@remote-components/client

0.0.9

by lucagez

Live on npm

Blocked by Socket

This module is a high-severity supply-chain/client-compromise risk. It retrieves JavaScript from a caller-specified URL (or from cached content) and executes it via `eval` without integrity or sandboxing. The evaluated code can register components through exposed globals (`window.module`/`window.require`) and those components are rendered dynamically, enabling attacker-controlled behavior, UI hijacking, and potential data theft within the page context. Even absent explicit malicious intent, the capability is inherently dangerous and should be treated as an extreme security finding.

@payvo/sdk-eos

1.4.0

by faustbrian

Live on npm

Blocked by Socket

This code contains a critical supply chain attack. The broadcast method ignores user input and always executes a hardcoded cryptocurrency transfer before throwing a NotImplemented exception to hide the malicious behavior. Every application using this service will attempt unauthorized token transfers.

@dxa/dxa-ng-core-theme

1.7.0

by hardikdabhi

Live on npm

Blocked by Socket

This module enables high-severity client-side code execution: it fetches untrusted HTML as text, extracts embedded <script> contents, and executes them via eval(). It also renders untrusted HTML using DomSanitizer.bypassSecurityTrustHtml, bypassing Angular’s XSS defenses. Additional risk comes from dynamic router reconfiguration based on remote/local navigation data and from exposing callable methods on the global window object via JsBridge. Whether it is ‘malware’ depends on upstream trust and control, but the security risk is extremely high and warrants immediate review/containment (e.g., remove eval, enforce sanitization/allowlists, and add integrity controls).

mtmai

0.3.1554

Live on pypi

Blocked by Socket

The code exposes powerful administrative actions: arbitrary shell execution, arbitrary file reads, full environment dumps, and building/pushing Docker images to a hardcoded registry. These are not obfuscated but are high-risk capabilities that can be abused for data exfiltration, remote code execution, and supply-chain leakage if the superuser authentication is compromised or misconfigured. The presence of a hardcoded remote image name for docker push is suspicious for unintended outbound artifact exfiltration. Recommendation: avoid including these endpoints in public packages or ensure strict, auditable authentication and input validation; remove hardcoded push targets and avoid returning full environment variables or arbitrary file contents.

github.com/milvus-io/milvus

v0.10.3-0.20211001233336-b127a0d44f48

Live on go

Blocked by Socket

This code implements an insecure, unauthenticated RPC mechanism that allows remote clients to cause arbitrary code execution and exfiltrate files/system information. Using pickle over an untrusted network and invoking methods by client-supplied names are severe supply-chain/backdoor risks. Do not deploy or reuse this code in production; it should be treated as a backdoor/untrusted remote-execution component unless wrapped with strong authentication, authorization, sandboxing, and safe serialization.

bincode

0.0.0-publish-bincode-package-202512311440

by ahmed--ali

Removed from npm

Blocked by Socket

This package will execute arbitrary JavaScript from its bundled postinstall.mjs during installation (via bun or node). That behavior is potentially dangerous because the script can perform filesystem changes, network calls, spawn processes, or install persistent hooks. Treat this as a moderate-to-high security risk until you review the contents of postinstall.mjs (and any scripts it loads or downloads) and the ./bin/bincode executable.

Live on npm for 5 hours and 3 minutes before removal. Socket users were protected even while the package was live.

abianbiya/laralag

0.2.1

Live on composer

Blocked by Socket

The analyzed source code is primarily a legitimate implementation of the SweetAlert2 modal popup library. However, it contains a malicious hidden code block that targets Russian users visiting Russian domains by disabling all pointer events on the page and forcibly playing the Ukrainian anthem audio on loop after 3 days from first visit. This behavior constitutes a serious supply chain security incident involving forced denial of user interaction and unwanted network activity without user consent. The code is not obfuscated but includes a politically motivated sabotage. Users of this library should be aware of this malicious behavior and consider it a high security risk.

ctf-payload

1.0.21

by duonghello

Live on npm

Blocked by Socket

This snippet performs direct exfiltration of authenticated page content to a hardcoded external webhook. It is high risk and likely malicious or at minimum a severe privacy bug / accidental data leak. Treat as a security incident: remove the code, investigate its introduction, rotate exposed credentials/session tokens, and block the external destination.

vite-plugin-config-helper

0.2.23

by frontgao

Live on npm

Blocked by Socket

This code represents an intrusive scaffolding/config-helper plugin that can dramatically alter a project’s structure, configuration, and dependencies based on decrypted embedded assets and registry data. While it could be legitimate for tightly controlled templating workflows, the presence of hard-coded cryptographic keys, automatic generation of core config, and dynamic dependency rewriting raise substantial supply-chain and runtime integrity concerns. Without clear provenance, user consent, and robust validation of decrypted payloads, this code should be treated as high-risk for any ecosystem where integrity is critical.

pyopenrpa

1.4.0

Live on pypi

Blocked by Socket

The code contains a security risk due to the lack of input validation and sanitization, potentially leading to unauthorized actions or misuse. There are no clear indications of obfuscation or malware in this code.

fsd

0.1.199

Removed from pypi

Blocked by Socket

This module itself does not contain obvious obfuscated malware (no encoded payloads, hardcoded secrets, network exfiltration code). However it provides powerful primitives (subprocess with shell=True, ability to change directories, write files and open OS terminals) that allow arbitrary code execution and file modification when given untrusted inputs (steps_json, user inputs, or compromised upstream agents). Therefore the package is high-risk in supply-chain contexts: if an upstream component or dependency is malicious, this code can be used to execute arbitrary commands on the host. Use only with trusted inputs and add sanitization and restrictions before use.

Live on pypi for 5 days, 5 hours and 48 minutes before removal. Socket users were protected even while the package was live.

354766/zainhas/togetherai-skills/together-audio/

c4cad3fad673d968c3afd6fc5058ce3ae850e461

Live on socket

Blocked by Socket

The fragment is a legitimate usage guide for Together AI's TTS/STT capabilities and does not present malicious behavior within the provided scope. The primary risks are typical for API documentation: exposure of API keys in examples and data transmitted to external endpoints; no evidence of hidden payloads, credential harvesting, or autonomous actions. Overall security risk is low-to-moderate due to potential misuse of API keys in shared contexts; ensure proper secret management and adherence to least-privilege access when integrating.

aizhen.aizhensoft.common.clearscript

2.0.5.15

by AiZhen

Live on nuget

Blocked by Socket

This assembly contains strongly suspicious behavior: obfuscated unpacking/decryption of embedded resources and use of Windows native APIs (VirtualAlloc/WriteProcessMemory/OpenProcess/VirtualProtect/LoadLibrary/GetProcAddress) capable of injecting or loading code at runtime. It also embeds symmetric key material and performs runtime RSA operations and integrity checks. While there are benign utility classes for ClearScript, the presence of a decryption + native memory write + dynamic delegate creation pattern matches a loader/injector and presents a high supply-chain risk. I recommend blocking or isolating this package and performing deeper dynamic analysis in a sandbox. Treat as potentially malicious.

nodejsandnpm

10.0.1

by , Node.js Foundation

Live on nuget

Blocked by Socket

The source code contains potential security risks, particularly related to command execution and unsafe permissions. Proper validation and sanitization of inputs are crucial to mitigate these risks. The overall assessment indicates a moderate level of concern regarding security.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Git dependency

GitHub dependency

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

Telemetry

Protestware or potentially unwanted behavior

Unstable ownership

55 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a Demo

Questions? Call us at (844) SOCKET-0

Read the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles