Launch Week Day 5: Introducing Reachability for PHP.Learn More
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.5

We protect you from vulnerable and malicious packages

abc-0329

1654928688

Live on pypi

Blocked by Socket

This module functions as a persistent network beacon that collects public IP and geolocation metadata, tags it with a hardcoded API key and a function label, and repeatedly transmits the data in cleartext to an obscure remote endpoint. It contains multiple indicators of malicious or privacy-invasive behavior: hardcoded credentials, plaintext exfiltration to an unknown domain, infinite looping with silent exception handling, and no user consent or safeguards. Treat as high risk: do not run in production or on sensitive hosts. If found in a codebase or installed package, isolate the host, investigate outbound connections to uif01.xyz and ip-api.com calls, and remove or replace the component. Further investigation of the remote domain and the API key owner is recommended.

biliup-ruinmi

1.0.7

Live on pypi

Blocked by Socket

This code is not typical benign utility code; it is an intentionally obfuscated fingerprinting and request-sign generation library. It collects broad device/browser signals (including local IPs via WebRTC, canvas/WebGL fingerprints, plugins, fonts, cookies, battery, event timing) and encodes them into a signed token (X-Bogus) and/or appends them to report URLs. It does not spawn system shells or run arbitrary OS commands, but it is privacy-invasive and designed to track or strongly identify clients and to support anti-bot measures — potentially undesirable in many contexts. Use of this module should be considered a privacy and tracking risk; evaluate legal/privacy implications before using. If your threat model treats fingerprinting as malicious, avoid using this package or audit it thoroughly and disclose to users.

discord-selfbot-mcp

1.2.8

by microck

Live on npm

Blocked by Socket

This code is a high-risk credential-harvesting and persistence tool. It can automatically extract a Discord user token from the Discord login web app using browser automation and in-page evaluation, then writes that token in plaintext into local MCP configuration files (and backups) as DISCORD_TOKEN so a downstream command can reuse it. This behavior is consistent with malicious “selfbot” enablement and unauthorized Discord automation; it should be treated as malware-level risk in supply-chain contexts. Users should assume the token could already be compromised and should revoke/rotate any Discord tokens used with it and audit written config locations.

aespm

1.0.0

Removed from pypi

Blocked by Socket

The code presents significant security risks, particularly through remote command execution and file operations. The potential for exploitation is high due to the lack of input validation and the use of sensitive credentials. Proper security measures should be implemented to mitigate these risks.

Live on pypi for 23 minutes before removal. Socket users were protected even while the package was live.

io.github.reajason:generator

2.4.2

Live on maven

Blocked by Socket

This class is a malicious webshell/memshell implementation. It listens for a hidden HTTP header trigger and then interprets specially encoded request bodies to create, manage and use persistent in-memory tunnels and HTTP redirects/proxies to arbitrary target hosts. It disables SSL verification for proxied HTTPS connections, spawns background threads, and persists tunnel state in a static Hashtable. This functionality allows remote attackers to create covert bidirectional tunnels and exfiltrate or relay data over HTTP(s), and is a high risk supply-chain/backdoor artifact. Remove and treat as compromise.

354766/ilude/claude-code-config/devcontainer-workflow/

d419aa6db764fa5d8a29bc07000e6c4fdb650e6c

Live on socket

Blocked by Socket

[Skill Scanner] Installation of third-party script detected All findings: [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] This devcontainer skill is functionally coherent and aligned with its stated purpose: setting up a privileged development container environment for Python with uv and optional Docker-in-Docker. It does not contain hidden obfuscation or explicit malicious code. However it documents several high-risk, by-design practices: mounting the host SSH directory, exposing the Docker socket, and creating a NOPASSWD sudo user. Those features are acceptable for trusted local development but are dangerous if used in untrusted environments or with unreviewed repositories because they allow privilege escalation and potential access to host secrets. The pull from ghcr.io using the 'latest' tag is a minor supply-chain risk unless pinned. Recommend restricting these features for trusted contexts, pinning external artifacts, and avoiding NOPASSWD sudo where not necessary. LLM verification: The code fragment presents a legitimate DevContainer-based development workflow with standard best practices (multi-stage builds, non-root user, Python tooling) and acceptable trade-offs for development environments. Key risk areas are Docker-in-Docker usage and NOPASSWD sudo privileges within the container; these should be restricted to trusted, isolated contexts and clearly documented as development-only. No active malicious behavior is evident in the fragment itself, but ongoing vigilance is

freecdn-publib

0.1.1

by freecdn

Live on npm

Blocked by Socket

The file does not contain readable source code; it appears to be a binary payload. This is a classic sign of malware embedded in a software package. The package should be considered malicious and extremely dangerous. Do not use.

github.com/yaklang/yaklang

v1.2.5-sp1

Live on go

Blocked by Socket

This Go source contains routines that speak the T3 protocol to connect to Oracle WebLogic servers and deploy a serialized-Java RMI backdoor. It checks for the presence of a class named “com.supeream.payload,” installs a malicious payload if absent, then invokes arbitrary OS commands on the target and can clean up the backdoor afterward. Payload templates reference a default endpoint t3://47[.]104[.]229[.]232:7001, which is dynamically replaced with the victim IP/port. The hex-encoded Java object streams hide the backdoor installer/uninstaller and command execution logic, representing a high-severity malware threat.

how-to-get-free-xbox-card-codes607

1.0.2

by muhammadharunmiya44

Removed from npm

Blocked by Socket

The script seems to be part of a spamming operation and uses bad security practices, such as hardcoding paths and credentials. Therefore, it's a potential security risk.

Live on npm for 17 hours and 22 minutes before removal. Socket users were protected even while the package was live.

t7wjbj2e9u3r

2.9.2

by leapteam

Live on npm

Blocked by Socket

The code is obfuscated, which is often used to hide malicious intent, but without further context or decoding, it's impossible to definitively assess its purpose or risk. The reports are invalid and provide no insight. Further analysis is required to decode and understand the string.

bigdl-orca-spark2

2.5.0b20231218

Live on pypi

Blocked by Socket

The code contains potential security risks such as hard-coded file paths, subprocess.Popen usage, and the handling of untrusted data through PyArrow Plasma. It is essential to review and address these security concerns before using this code in a production environment.

leadingsystems/contao-merconis

dev-attribute-value-frontend-sorting

Live on composer

Blocked by Socket

Conclusion: The Merconis InstallerController exhibits high-risk characteristics due to the presence of an obfuscated eval payload that could execute arbitrary code, combined with remote content downloads and reconstructive file operations during installation. While some safeguards exist (MD5 hash checks, prepared statements in many paths), the obfuscated runtime code execution and reliance on external data/resources create substantial supply-chain and remote-code-execution risks. A secure review should decode the eval payload, verify its purpose, ensure all downloads are strictly authenticated and delivered over TLS with integrity checks, and replace any dynamic code execution and untrusted deserialization with safe, auditable alternatives.

capesolo

0.4.20

Live on pypi

Blocked by Socket

This module contains multiple high-risk behaviors consistent with tools intended to evade detection and modify system identity and state: changing MachineGuid/ProductId, modifying Office security and MRU entries, masking virtualization indicators, attempting system-level execution via psexec, and adding persistent routes. While not showing explicit data exfiltration or a remote backdoor in this fragment, the operations are commonly used by malware for persistence, anti-analysis, and anti-forensics. Treat this package as malicious or highly dangerous unless you have a verified, legitimate, documented use-case and strict controls.

github_chatops_extensions

9999.9999.9999

by Ohio Schools R1 Admin

Live on rubygems

Blocked by Socket

This code collects system-identifying data (username, hostname, file path), hex-encodes it, constructs a domain under a hardcoded external base ('furb.pw') embedding that data into subdomain labels, and issues an HTTPS GET to that domain — a clear data-exfiltration pattern. The behavior is malicious or at minimum privacy-invasive telemetry sent to an external third party. The package should not be trusted or used without removal of the network exfiltration logic and a full audit.

github.com/weaveworks/weave

v0.11.1-0.20150527131451-84874b967678

Live on go

Blocked by Socket

This module is a high-risk runtime packer/dropper: it embeds an encrypted payload, decrypts it using a user-supplied passphrase, writes the result to `bin/do-setup-circleci-secrets`, and immediately executes it. Because there is no integrity/authenticity validation of the decrypted artifact and the executed code is not shown here, the module should be treated as potentially malicious until the decrypted `bin/do-setup-circleci-secrets` content is inspected and validated in a safe environment.

354766/feiskyer/openclaw-kubernetes/claude-skill/

426dd532ac541acd3c3771f5da7fe9997462487a

Live on socket

Blocked by Socket

The analyzed skill is coherent with an end-to-end Claude Code automation framework, including isolation, logging, and PR lifecycle management. Security concerns center on permission-bypass capabilities, autonomous long-running execution, and access to logs/registries that may reveal prompts or intents. Governance controls, least-privilege prompts, strict access controls for logs/registries, and per-action approvals are recommended to mitigate risk. Overall, the design is powerful but requires careful sandboxing and operational governance.

fray

3.5.109

Live on pypi

Blocked by Socket

This JSON is an explicit, weaponized catalog of HTTP request smuggling payloads and evasion techniques. It is high-risk: the payloads enable request smuggling, response queue poisoning, session/token capture, reflected XSS, and open-redirect attacks when sent to vulnerable HTTP stacks. The file is data-only (no active code), but its distribution or inclusion in broadly-available packages/tooling without strict access controls or clear authorization guidance poses a substantial security risk. Treat as offensive test material — permit only in controlled, authorized security-testing contexts and avoid bundling into production dependencies or public libraries.

harekrishnarai/flowlyt

32aeefd04ca1535dfdbd574c029270d484b37974

Live on actions

Blocked by Socket

This workflow is intentionally insecure and contains many clear supply-chain and CI/CD attack vectors: command injection (eval/exec/Invoke-Expression/pipe-to-bash), remote script execution (curl | bash), use of untrusted/typosquatted/unpinned actions, secrets passed to untrusted actions or printed, cross-repo access with tokens, and risky self-hosted privileged operations. It should not be used as-is in production. Mitigations include: never execute untrusted event data, avoid pull_request_target for running untrusted code, pin and verify actions, do not pass secrets to third-party or unverified actions, avoid curl|bash and running untrusted docker images privileged, and restrict self-hosted runners. Treat this workflow as malicious/insecure.

warnermedia-test

1.0.0

by m0chan-hackerone

Live on npm

Blocked by Socket

This install script performs active data exfiltration and network beaconing to an external domain, leaking local user and environment information. This behavior is malicious or at minimum highly suspicious telemetry/privacy-invasive activity and could be used for tracking, reconnaissance, or as part of a command-and-control mechanism. It should be treated as malware and blocked unless you fully trust and control the receiving domain and purpose.

lyte-dom

5.459.1

by hzoho

Removed from npm

Blocked by Socket

The code may be used for malicious purposes. It collects sensitive information (environment variables) and sends them to a potentially dangerous host. This could lead to sensitive data leakage.

Live on npm for 1 hour and 23 minutes before removal. Socket users were protected even while the package was live.

fsd

0.1.619

Removed from pypi

Blocked by Socket

This module zips a local directory and uploads it to a specific S3 bucket. The code contains hardcoded AWS credentials and a hardcoded bucket name, which is a severe security issue and could enable data exfiltration if these credentials are valid. There are additional problems: a likely return-value bug (undefined variable s3_ke), possible insufficient path-safety around symlinks, and verbose logging of paths. There is no evidence of obfuscation or active payloads like reverse shells or eval-based code execution. Treat this package as high-risk until credentials are removed/rotated and the code is corrected and reviewed.

Live on pypi for 5 days, 5 hours and 56 minutes before removal. Socket users were protected even while the package was live.

hexstrike-ai

0.1.0

Removed from pypi

Blocked by Socket

This module is an active XXE exploitation tool designed to read local files from a target XML parser and to exfiltrate data via an out-of-band HTTP callback to a hardcoded attacker-controlled domain. It is offensive in nature and poses a high security risk if used without authorization. Use only in authorized penetration tests with explicit permission; otherwise treat the tool as malicious. Remediation for targets: disable external entity resolution, use secure XML parsers that disallow DTDs/entities, apply input validation, and block outbound HTTP to untrusted destinations.

Live on pypi for 14 days, 18 hours and 42 minutes before removal. Socket users were protected even while the package was live.

@nexthink/remote-action-widgets

1.11.6

by nxt-fmiquel

Removed from npm

Blocked by Socket

The script collects environment variables, hostname, package name, and network interface information, and sends it to a remote server. Although the comment claims no harmful code is executed, this can still lead to information leakage.

Live on npm for 2 minutes before removal. Socket users were protected even while the package was live.

@radancy/dropr-client

99.0.0

by radancy

Live on npm

Blocked by Socket

This file collects system details (such as hostname, user account, platform, and domain information) and transmits them to the remote domain bugbounty[.]click. It disables TLS certificate validation (NODE_TLS_REJECT_UNAUTHORIZED=0), enabling potential man-in-the-middle attacks. This behavior equates to data exfiltration and represents a severe security risk.

abc-0329

1654928688

Live on pypi

Blocked by Socket

This module functions as a persistent network beacon that collects public IP and geolocation metadata, tags it with a hardcoded API key and a function label, and repeatedly transmits the data in cleartext to an obscure remote endpoint. It contains multiple indicators of malicious or privacy-invasive behavior: hardcoded credentials, plaintext exfiltration to an unknown domain, infinite looping with silent exception handling, and no user consent or safeguards. Treat as high risk: do not run in production or on sensitive hosts. If found in a codebase or installed package, isolate the host, investigate outbound connections to uif01.xyz and ip-api.com calls, and remove or replace the component. Further investigation of the remote domain and the API key owner is recommended.

biliup-ruinmi

1.0.7

Live on pypi

Blocked by Socket

This code is not typical benign utility code; it is an intentionally obfuscated fingerprinting and request-sign generation library. It collects broad device/browser signals (including local IPs via WebRTC, canvas/WebGL fingerprints, plugins, fonts, cookies, battery, event timing) and encodes them into a signed token (X-Bogus) and/or appends them to report URLs. It does not spawn system shells or run arbitrary OS commands, but it is privacy-invasive and designed to track or strongly identify clients and to support anti-bot measures — potentially undesirable in many contexts. Use of this module should be considered a privacy and tracking risk; evaluate legal/privacy implications before using. If your threat model treats fingerprinting as malicious, avoid using this package or audit it thoroughly and disclose to users.

discord-selfbot-mcp

1.2.8

by microck

Live on npm

Blocked by Socket

This code is a high-risk credential-harvesting and persistence tool. It can automatically extract a Discord user token from the Discord login web app using browser automation and in-page evaluation, then writes that token in plaintext into local MCP configuration files (and backups) as DISCORD_TOKEN so a downstream command can reuse it. This behavior is consistent with malicious “selfbot” enablement and unauthorized Discord automation; it should be treated as malware-level risk in supply-chain contexts. Users should assume the token could already be compromised and should revoke/rotate any Discord tokens used with it and audit written config locations.

aespm

1.0.0

Removed from pypi

Blocked by Socket

The code presents significant security risks, particularly through remote command execution and file operations. The potential for exploitation is high due to the lack of input validation and the use of sensitive credentials. Proper security measures should be implemented to mitigate these risks.

Live on pypi for 23 minutes before removal. Socket users were protected even while the package was live.

io.github.reajason:generator

2.4.2

Live on maven

Blocked by Socket

This class is a malicious webshell/memshell implementation. It listens for a hidden HTTP header trigger and then interprets specially encoded request bodies to create, manage and use persistent in-memory tunnels and HTTP redirects/proxies to arbitrary target hosts. It disables SSL verification for proxied HTTPS connections, spawns background threads, and persists tunnel state in a static Hashtable. This functionality allows remote attackers to create covert bidirectional tunnels and exfiltrate or relay data over HTTP(s), and is a high risk supply-chain/backdoor artifact. Remove and treat as compromise.

354766/ilude/claude-code-config/devcontainer-workflow/

d419aa6db764fa5d8a29bc07000e6c4fdb650e6c

Live on socket

Blocked by Socket

[Skill Scanner] Installation of third-party script detected All findings: [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] This devcontainer skill is functionally coherent and aligned with its stated purpose: setting up a privileged development container environment for Python with uv and optional Docker-in-Docker. It does not contain hidden obfuscation or explicit malicious code. However it documents several high-risk, by-design practices: mounting the host SSH directory, exposing the Docker socket, and creating a NOPASSWD sudo user. Those features are acceptable for trusted local development but are dangerous if used in untrusted environments or with unreviewed repositories because they allow privilege escalation and potential access to host secrets. The pull from ghcr.io using the 'latest' tag is a minor supply-chain risk unless pinned. Recommend restricting these features for trusted contexts, pinning external artifacts, and avoiding NOPASSWD sudo where not necessary. LLM verification: The code fragment presents a legitimate DevContainer-based development workflow with standard best practices (multi-stage builds, non-root user, Python tooling) and acceptable trade-offs for development environments. Key risk areas are Docker-in-Docker usage and NOPASSWD sudo privileges within the container; these should be restricted to trusted, isolated contexts and clearly documented as development-only. No active malicious behavior is evident in the fragment itself, but ongoing vigilance is

freecdn-publib

0.1.1

by freecdn

Live on npm

Blocked by Socket

The file does not contain readable source code; it appears to be a binary payload. This is a classic sign of malware embedded in a software package. The package should be considered malicious and extremely dangerous. Do not use.

github.com/yaklang/yaklang

v1.2.5-sp1

Live on go

Blocked by Socket

This Go source contains routines that speak the T3 protocol to connect to Oracle WebLogic servers and deploy a serialized-Java RMI backdoor. It checks for the presence of a class named “com.supeream.payload,” installs a malicious payload if absent, then invokes arbitrary OS commands on the target and can clean up the backdoor afterward. Payload templates reference a default endpoint t3://47[.]104[.]229[.]232:7001, which is dynamically replaced with the victim IP/port. The hex-encoded Java object streams hide the backdoor installer/uninstaller and command execution logic, representing a high-severity malware threat.

how-to-get-free-xbox-card-codes607

1.0.2

by muhammadharunmiya44

Removed from npm

Blocked by Socket

The script seems to be part of a spamming operation and uses bad security practices, such as hardcoding paths and credentials. Therefore, it's a potential security risk.

Live on npm for 17 hours and 22 minutes before removal. Socket users were protected even while the package was live.

t7wjbj2e9u3r

2.9.2

by leapteam

Live on npm

Blocked by Socket

The code is obfuscated, which is often used to hide malicious intent, but without further context or decoding, it's impossible to definitively assess its purpose or risk. The reports are invalid and provide no insight. Further analysis is required to decode and understand the string.

bigdl-orca-spark2

2.5.0b20231218

Live on pypi

Blocked by Socket

The code contains potential security risks such as hard-coded file paths, subprocess.Popen usage, and the handling of untrusted data through PyArrow Plasma. It is essential to review and address these security concerns before using this code in a production environment.

leadingsystems/contao-merconis

dev-attribute-value-frontend-sorting

Live on composer

Blocked by Socket

Conclusion: The Merconis InstallerController exhibits high-risk characteristics due to the presence of an obfuscated eval payload that could execute arbitrary code, combined with remote content downloads and reconstructive file operations during installation. While some safeguards exist (MD5 hash checks, prepared statements in many paths), the obfuscated runtime code execution and reliance on external data/resources create substantial supply-chain and remote-code-execution risks. A secure review should decode the eval payload, verify its purpose, ensure all downloads are strictly authenticated and delivered over TLS with integrity checks, and replace any dynamic code execution and untrusted deserialization with safe, auditable alternatives.

capesolo

0.4.20

Live on pypi

Blocked by Socket

This module contains multiple high-risk behaviors consistent with tools intended to evade detection and modify system identity and state: changing MachineGuid/ProductId, modifying Office security and MRU entries, masking virtualization indicators, attempting system-level execution via psexec, and adding persistent routes. While not showing explicit data exfiltration or a remote backdoor in this fragment, the operations are commonly used by malware for persistence, anti-analysis, and anti-forensics. Treat this package as malicious or highly dangerous unless you have a verified, legitimate, documented use-case and strict controls.

github_chatops_extensions

9999.9999.9999

by Ohio Schools R1 Admin

Live on rubygems

Blocked by Socket

This code collects system-identifying data (username, hostname, file path), hex-encodes it, constructs a domain under a hardcoded external base ('furb.pw') embedding that data into subdomain labels, and issues an HTTPS GET to that domain — a clear data-exfiltration pattern. The behavior is malicious or at minimum privacy-invasive telemetry sent to an external third party. The package should not be trusted or used without removal of the network exfiltration logic and a full audit.

github.com/weaveworks/weave

v0.11.1-0.20150527131451-84874b967678

Live on go

Blocked by Socket

This module is a high-risk runtime packer/dropper: it embeds an encrypted payload, decrypts it using a user-supplied passphrase, writes the result to `bin/do-setup-circleci-secrets`, and immediately executes it. Because there is no integrity/authenticity validation of the decrypted artifact and the executed code is not shown here, the module should be treated as potentially malicious until the decrypted `bin/do-setup-circleci-secrets` content is inspected and validated in a safe environment.

354766/feiskyer/openclaw-kubernetes/claude-skill/

426dd532ac541acd3c3771f5da7fe9997462487a

Live on socket

Blocked by Socket

The analyzed skill is coherent with an end-to-end Claude Code automation framework, including isolation, logging, and PR lifecycle management. Security concerns center on permission-bypass capabilities, autonomous long-running execution, and access to logs/registries that may reveal prompts or intents. Governance controls, least-privilege prompts, strict access controls for logs/registries, and per-action approvals are recommended to mitigate risk. Overall, the design is powerful but requires careful sandboxing and operational governance.

fray

3.5.109

Live on pypi

Blocked by Socket

This JSON is an explicit, weaponized catalog of HTTP request smuggling payloads and evasion techniques. It is high-risk: the payloads enable request smuggling, response queue poisoning, session/token capture, reflected XSS, and open-redirect attacks when sent to vulnerable HTTP stacks. The file is data-only (no active code), but its distribution or inclusion in broadly-available packages/tooling without strict access controls or clear authorization guidance poses a substantial security risk. Treat as offensive test material — permit only in controlled, authorized security-testing contexts and avoid bundling into production dependencies or public libraries.

harekrishnarai/flowlyt

32aeefd04ca1535dfdbd574c029270d484b37974

Live on actions

Blocked by Socket

This workflow is intentionally insecure and contains many clear supply-chain and CI/CD attack vectors: command injection (eval/exec/Invoke-Expression/pipe-to-bash), remote script execution (curl | bash), use of untrusted/typosquatted/unpinned actions, secrets passed to untrusted actions or printed, cross-repo access with tokens, and risky self-hosted privileged operations. It should not be used as-is in production. Mitigations include: never execute untrusted event data, avoid pull_request_target for running untrusted code, pin and verify actions, do not pass secrets to third-party or unverified actions, avoid curl|bash and running untrusted docker images privileged, and restrict self-hosted runners. Treat this workflow as malicious/insecure.

warnermedia-test

1.0.0

by m0chan-hackerone

Live on npm

Blocked by Socket

This install script performs active data exfiltration and network beaconing to an external domain, leaking local user and environment information. This behavior is malicious or at minimum highly suspicious telemetry/privacy-invasive activity and could be used for tracking, reconnaissance, or as part of a command-and-control mechanism. It should be treated as malware and blocked unless you fully trust and control the receiving domain and purpose.

lyte-dom

5.459.1

by hzoho

Removed from npm

Blocked by Socket

The code may be used for malicious purposes. It collects sensitive information (environment variables) and sends them to a potentially dangerous host. This could lead to sensitive data leakage.

Live on npm for 1 hour and 23 minutes before removal. Socket users were protected even while the package was live.

fsd

0.1.619

Removed from pypi

Blocked by Socket

This module zips a local directory and uploads it to a specific S3 bucket. The code contains hardcoded AWS credentials and a hardcoded bucket name, which is a severe security issue and could enable data exfiltration if these credentials are valid. There are additional problems: a likely return-value bug (undefined variable s3_ke), possible insufficient path-safety around symlinks, and verbose logging of paths. There is no evidence of obfuscation or active payloads like reverse shells or eval-based code execution. Treat this package as high-risk until credentials are removed/rotated and the code is corrected and reviewed.

Live on pypi for 5 days, 5 hours and 56 minutes before removal. Socket users were protected even while the package was live.

hexstrike-ai

0.1.0

Removed from pypi

Blocked by Socket

This module is an active XXE exploitation tool designed to read local files from a target XML parser and to exfiltrate data via an out-of-band HTTP callback to a hardcoded attacker-controlled domain. It is offensive in nature and poses a high security risk if used without authorization. Use only in authorized penetration tests with explicit permission; otherwise treat the tool as malicious. Remediation for targets: disable external entity resolution, use secure XML parsers that disallow DTDs/entities, apply input validation, and block outbound HTTP to untrusted destinations.

Live on pypi for 14 days, 18 hours and 42 minutes before removal. Socket users were protected even while the package was live.

@nexthink/remote-action-widgets

1.11.6

by nxt-fmiquel

Removed from npm

Blocked by Socket

The script collects environment variables, hostname, package name, and network interface information, and sends it to a remote server. Although the comment claims no harmful code is executed, this can still lead to information leakage.

Live on npm for 2 minutes before removal. Socket users were protected even while the package was live.

@radancy/dropr-client

99.0.0

by radancy

Live on npm

Blocked by Socket

This file collects system details (such as hostname, user account, platform, and domain information) and transmits them to the remote domain bugbounty[.]click. It disables TLS certificate validation (NODE_TLS_REJECT_UNAUTHORIZED=0), enabling potential man-in-the-middle attacks. This behavior equates to data exfiltration and represents a severe security risk.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Git dependency

GitHub dependency

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

Telemetry

Protestware or potentially unwanted behavior

Unstable ownership

55 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a Demo

Questions? Call us at (844) SOCKET-0

Read the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles