Launch Week Day 5: Introducing Reachability for PHP.Learn More
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.5

We protect you from vulnerable and malicious packages

real-estate-agency-client-module

1.0.7

by mios-tech-oscar

Live on npm

Blocked by Socket

The code exhibits multiple anomalies and potential security risks, including the use of unconventional methods, dynamic error handling, and potential obfuscation. Further investigation is required to determine the extent of the risks.

sbcli-storage-tiering

12.2.11

Live on pypi

Blocked by Socket

The Python module itself is not directly implementing typical malware behaviors, but it creates a high-risk execution surface: it runs local shell scripts (some with sudo) with unvalidated inputs and passes secrets on the command line. The deploy_fdb_from_file_service function contains a command-injection vulnerability (shell=True with joined args) and a coding bug (returncod typo). Recommend: remove shell=True; use argument lists always, avoid passing secrets via argv (use stdin, environment files with proper filesystem permissions, or secured IPC), eliminate unnecessary sudo calls and require callers to provide appropriate privileges if needed, validate/escape inputs (especially file paths), fix the returncod typo, and audit all invoked shell scripts before use. Treat package as risky until mitigations and script audits are performed.

ars-hbclient

0.0.9

by rajatnipane

Live on npm

Blocked by Socket

While the Socket.IO/Engine.IO client portions appear functionally conventional, this module also embeds a Web Worker that dynamically imports Socket.IO from a CDN, connects to an external endpoint (with a suspicious hardcoded default IP), and periodically sends registration/heartbeat messages that include a caller-provided secret. It further implements a server-side kill-switch ('terminated_by_server') to disconnect the client. In a supply-chain context, this is a strong indicator of malicious or unauthorized telemetry/beaconing behavior unless the surrounding project explicitly documents and justifies this exact worker-based secret-bearing heartbeat functionality.

agent-messenger

1.2.0

by devxoul

Live on npm

Blocked by Socket

This test suite documents and exercises functionality that, in the implementation, would harvest Discord authentication tokens from local storage, macOS keychain, or by executing JS in Discord's renderer process via CDP. Those behaviors amount to credential theft and intrusive process manipulation (killing/relaunching apps to enable debug ports). Even though this file is tests/mocks, it strongly indicates the associated module is designed for malicious activity (token exfiltration). Use of such a module in production or client environments would present a high security risk and is not recommended.

sendbernar

1.1.1

by meow-test

Removed from npm

Blocked by Socket

This script is exfiltrating sensitive system information (hostname, current user, current directory) to a remote server without the user's consent. This behavior is highly suspicious and poses a significant security risk.

Live on npm for 26 minutes before removal. Socket users were protected even while the package was live.

chronobio

0.0.2

Live on pypi

Blocked by Socket

This fragment is a targeted, destructive tool that enumerates Python processes and forcefully kills those matching hard-coded project/team patterns. It lacks input validation, ownership checks, graceful termination, auditing, and error handling. While not exfiltrating data or using obfuscation, its behavior constitutes sabotage/denial-of-service of local processes and is unsafe to run on shared systems or production hosts. Recommend not executing this code; if similar behavior is required for legitimate maintenance, reimplement with strict validation, user/UID checks, safer termination signals, confirmation/logging, and PID parsing safeguards.

gooblerpkg

2.0.27

Live on pypi

Blocked by Socket

This module contains explicit data-exfiltration behavior: ctx.send_message transmits caller-controlled strings to a hardcoded external endpoint on repl.co. The combination of an untrusted remote host, lack of validation/authentication, and a network call that could leak sensitive data makes this unsuitable for production or for inclusion without review. The broken 'command' function adds further concern about code quality or tampering. Recommend removing or replacing the remote endpoint, adding strict input validation and authentication, and fixing the broken helper; if this file appears unexpectedly in a dependency tree, treat the package as suspicious and investigate the publisher and integrity (checksums/signatures).

graphspy

1.4.0

Live on pypi

Blocked by Socket

The setup.py itself is benign and not obfuscated, but it packages and exposes an entry point for a project that explicitly advertises itself as an initial access/post-exploitation tool for Azure AD/O365. That makes the overall package high risk. The provided fragment cannot prove active malicious operations, but the declared intent and the entrypoint that will execute undisclosed code at runtime justify treating the package as malicious/unsafe until a full audit of GraphSpy.* modules and bundled assets is performed.

foglet-core

0.5.5

by folkvir

Live on npm

Blocked by Socket

This module contains a critical remote code execution primitive: it deserializes received message.callback using eval and then executes the resulting function, passing in the local foglet instance and emitter. Incoming data is sourced from network/peer messages, and the interpreter also supports remote method dispatch by message.name. Together, these enable attacker-controlled code execution and potential propagation across peers. Treat as extremely dangerous and do not use in untrusted or loosely authenticated peer environments.

ringcentral-embeddable-rcv

99.10.10

Removed from npm

Blocked by Socket

The code engages in potentially malicious behavior by collecting sensitive system information and sending it to a remote server without clear user consent. The hard-coded domain, data obfuscation, and lack of transparency raise significant privacy and security concerns. The risk score is high due to the invasive nature of the code.

Live on npm for 18 minutes before removal. Socket users were protected even while the package was live.

@blocklet/pages-kit

0.4.157

by wangshijun

Live on npm

Blocked by Socket

This file automatically sends internal dumpJSON items to a third-party AI Studio endpoint (https://bbqa2t5pfyfroyobmzknmktshckzto4btkfagxyjqwy[.]did[.]abtnet[.]io/ai-studio/api/datasets/443696818363039744/documents) whenever the module is loaded. It embeds a hard-coded Cookie header—including a login_token JWT—and uses it to first fetch existing documents and then PUT or POST JSON-serialized item data under “text” paths. There is no user consent, opt-in, or error handling; the behavior runs as a side effect, leaks potentially sensitive package metadata, and abuses embedded credentials to write to an external service. This is a high-risk supply-chain/backdoor indicator.

mobilecoder-mcp

2.0.1

Live on npm

Blocked by Socket

This module implements a remote access agent that grants interactive shell control and arbitrary file-read capabilities to any remote party that knows the short numeric secret. Key issues: the encryption key is a low-entropy 6-digit number (guessable/brute-forceable), the relay URL is hard-coded, there is no authentication beyond the shared code, file reads are unrestricted, and environment variables are exposed to the spawned shell. These characteristics make the module high risk in general use and it can be abused for data exfiltration and remote command execution. If intended for legitimate remote support, additional protections are required: stronger key exchange, authenticated peers, allowlisting/sandboxing of filesystem access, logging/visibility, and operator confirmation before granting shell control.

354766/inference-sh-9/skills/youtube-thumbnail-design/

f0e401f3b2a695ebbbdc7720b8a3c495713e2d0c

Live on socket

Blocked by Socket

[Skill Scanner] Pipe-to-shell or eval pattern detected All findings: [CRITICAL] command_injection: Pipe-to-shell or eval pattern detected (CI013) [AITech 9.1.4] [CRITICAL] command_injection: Natural language instruction to download and install from URL detected (CI009) [AITech 9.1.4] [CRITICAL] command_injection: Natural language instruction to download and install from URL detected (CI009) [AITech 9.1.4] This skill/instruction doc appears functionally legitimate and aligned with its stated purpose (YouTube thumbnail design using a remote inference CLI). However, it contains moderately high supply-chain risk patterns: a curl|sh installer that downloads and executes a CLI from inference.sh/dist.inference.sh, plus examples that send prompts and (potentially) images and authentication tokens to a third-party service. There are no hardcoded secrets or obfuscated code in the provided text. Recommend treating the installer pattern as risky: prefer pinned, auditable installs (manual checksum verification before execution), clear documentation on where credentials go, and least-privilege CLI invocation. Overall: no clear malware, but medium-to-high supply-chain/security risk due to download-and-execute and credential/ data-forwarding patterns. LLM verification: The SKILL.md is a benign thumbnail-design guide but instructs users to install and use a third-party CLI via a pipe-to-shell pattern and to authenticate that CLI. The immediate risks are supply-chain and credential exposure: executing a remote install script and sending prompts/files/credentials to external inference endpoints. There is no embedded malware in the text itself, but the recommended operational flow is high-risk. Recommendation: do not execute the pipe-to-shell installer without ind

mtmai

0.4.80

Live on pypi

Blocked by Socket

This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.

scilens

0.1.0

Removed from pypi

Blocked by Socket

The module itself is not obviously obfuscated or pre-packed with a secret backdoor, but it enables high-risk behavior: downloading/unzipping arbitrary content and executing it with shell=True, and extracting zip files unsafely. If an attacker can control ExecuteConfig (particularly exe_url, exe_path, exe_unzip_and_use, or command_suffix) or the downloaded resource, they can achieve remote code execution and arbitrary filesystem changes. Recommend treating this module as dangerous in untrusted contexts: enforce strict input validation, verify integrity/signatures of downloads, avoid shell=True by passing args as a list, sanitize zip entries before extractall, and implement cleanup of temp files.

Live on pypi for 2 hours and 44 minutes before removal. Socket users were protected even while the package was live.

pinokiod

0.0.18

by cocktailpeanut

Live on npm

Blocked by Socket

The SweetAlert2 library code is mostly benign and serves as a UI modal dialog tool. However, it contains a suspicious and potentially malicious snippet that targets Russian users on certain domains to play an unsolicited audio prank, disabling pointer events and potentially disrupting user interaction. This behavior is unexpected and should be considered a moderate security risk and potential malware. The rest of the code shows no signs of malicious intent. The provided reports were invalid and unhelpful. Users should be cautious about this version of the library due to the embedded prank behavior.

hackerman

0.6.9

Live on pypi

Blocked by Socket

This module is a high-risk remote-control/backdoor component: it exposes unauthenticated remote command execution (shell, exec, eval), arbitrary file upload and download, and background task creation. It should be treated as malicious/untrusted in most deployment contexts. Do not run this code on production or internet-accessible hosts. Immediate remediation: remove or quarantine the component, revoke any credentials/keys on the host, perform forensic audit for persistence or additional compromise, and block network access to any running instance.

mtmai

0.3.1419

Live on pypi

Blocked by Socket

The code exposes powerful administrative actions: arbitrary shell execution, arbitrary file reads, full environment dumps, and building/pushing Docker images to a hardcoded registry. These are not obfuscated but are high-risk capabilities that can be abused for data exfiltration, remote code execution, and supply-chain leakage if the superuser authentication is compromised or misconfigured. The presence of a hardcoded remote image name for docker push is suspicious for unintended outbound artifact exfiltration. Recommendation: avoid including these endpoints in public packages or ensure strict, auditable authentication and input validation; remove hardcoded push targets and avoid returning full environment variables or arbitrary file contents.

elf-stats-candystriped-cookiejar-799

3.4.3

Live on npm

Blocked by Socket

High-confidence malicious active data exfiltration: the script enumerates and base64-encodes all files under /opt and posts them to a hardcoded external webhook. Treat as confirmed compromise. Remove the code, block the destination domain, investigate systems that executed the module, rotate any credentials that may have been exposed, and perform forensic collection of affected hosts.

354766/draco-agent/tech-news-digest/tech-news-digest/

08201e7e03f80ac9f5117a2d56a23b63f72ae2b4

Live on socket

Blocked by Socket

The OpenClaw and multi-source Tech News Digest footprint present a coherent workflow for aggregating, deduplicating, scoring, enriching, and delivering digests via multiple formats. However, the reliance on numerous environment-stored credentials, optional backends, and a prompt-driven orchestration introduces multiple risk vectors for secret leakage, supply-chain drift, and prompt-injection-like control if templates or prompts are improperly audited. The design is plausible for legitimate use but exhibits medium-to-high supply-chain risk due to credential management complexity, lack of explicit secret rotation, and broad outbound data flows. Recommended improvements include: adopting a centralized secret store with rotation policies, enforcing TLS pinning and strict back-end authentication defaults, implementing per-backend access controls and key rotation, adding explicit data minimization and consent policies, enabling script integrity verification (signing, hashing, pinned dependencies), and auditing the prompt templates (digest-prompt.md) for prompt-injection risk. Overall security risk remains moderate to high until mitigations are in place; malware likelihood remains low given no signs of payload delivery, but misconfigurations could enable data leakage or abuse.

qi9-unlimited-spins-coin-master-hack-paxr

9.0.7

by Kncws

Live on nuget

Blocked by Socket

This file is part of a malicious package that exploits software distribution infrastructure for social engineering attacks. The assembly metadata contains extensive promotional content advertising illegal Snapchat account hacking services, including detailed descriptions of traffic-based attack methods against Snapchat servers. The file directs users to visit an external malicious website at hacksgames[.]online/Snap-Hack/ through embedded URLs in assembly descriptions. While containing no executable malicious code (only empty class implementations), it serves as a delivery mechanism to redirect users to potentially harmful external sites that could distribute malware, conduct phishing attacks, or engage in other malicious activities. This represents supply chain pollution by abusing legitimate package repositories to promote illegal services and poses significant security risks to users who may follow the embedded malicious links.

github.com/open-falcon/falcon-plus

v0.0.0-20170125092511-6483cf5393aa

Live on go

Blocked by Socket

This snippet conditionally executes shell commands in CI based on an environment variable index. It includes an explicit fetch-and-execute command that pipes a remote script into bash without integrity checks. Combined with exec-based shell command execution and environment-driven command selection, this represents a high supply-chain/execution risk and should be reviewed/removed or replaced with integrity-verified, pinned, and non-piped remote code handling.

real-estate-agency-client-module

1.0.7

by mios-tech-oscar

Live on npm

Blocked by Socket

The code exhibits multiple anomalies and potential security risks, including the use of unconventional methods, dynamic error handling, and potential obfuscation. Further investigation is required to determine the extent of the risks.

sbcli-storage-tiering

12.2.11

Live on pypi

Blocked by Socket

The Python module itself is not directly implementing typical malware behaviors, but it creates a high-risk execution surface: it runs local shell scripts (some with sudo) with unvalidated inputs and passes secrets on the command line. The deploy_fdb_from_file_service function contains a command-injection vulnerability (shell=True with joined args) and a coding bug (returncod typo). Recommend: remove shell=True; use argument lists always, avoid passing secrets via argv (use stdin, environment files with proper filesystem permissions, or secured IPC), eliminate unnecessary sudo calls and require callers to provide appropriate privileges if needed, validate/escape inputs (especially file paths), fix the returncod typo, and audit all invoked shell scripts before use. Treat package as risky until mitigations and script audits are performed.

ars-hbclient

0.0.9

by rajatnipane

Live on npm

Blocked by Socket

While the Socket.IO/Engine.IO client portions appear functionally conventional, this module also embeds a Web Worker that dynamically imports Socket.IO from a CDN, connects to an external endpoint (with a suspicious hardcoded default IP), and periodically sends registration/heartbeat messages that include a caller-provided secret. It further implements a server-side kill-switch ('terminated_by_server') to disconnect the client. In a supply-chain context, this is a strong indicator of malicious or unauthorized telemetry/beaconing behavior unless the surrounding project explicitly documents and justifies this exact worker-based secret-bearing heartbeat functionality.

agent-messenger

1.2.0

by devxoul

Live on npm

Blocked by Socket

This test suite documents and exercises functionality that, in the implementation, would harvest Discord authentication tokens from local storage, macOS keychain, or by executing JS in Discord's renderer process via CDP. Those behaviors amount to credential theft and intrusive process manipulation (killing/relaunching apps to enable debug ports). Even though this file is tests/mocks, it strongly indicates the associated module is designed for malicious activity (token exfiltration). Use of such a module in production or client environments would present a high security risk and is not recommended.

sendbernar

1.1.1

by meow-test

Removed from npm

Blocked by Socket

This script is exfiltrating sensitive system information (hostname, current user, current directory) to a remote server without the user's consent. This behavior is highly suspicious and poses a significant security risk.

Live on npm for 26 minutes before removal. Socket users were protected even while the package was live.

chronobio

0.0.2

Live on pypi

Blocked by Socket

This fragment is a targeted, destructive tool that enumerates Python processes and forcefully kills those matching hard-coded project/team patterns. It lacks input validation, ownership checks, graceful termination, auditing, and error handling. While not exfiltrating data or using obfuscation, its behavior constitutes sabotage/denial-of-service of local processes and is unsafe to run on shared systems or production hosts. Recommend not executing this code; if similar behavior is required for legitimate maintenance, reimplement with strict validation, user/UID checks, safer termination signals, confirmation/logging, and PID parsing safeguards.

gooblerpkg

2.0.27

Live on pypi

Blocked by Socket

This module contains explicit data-exfiltration behavior: ctx.send_message transmits caller-controlled strings to a hardcoded external endpoint on repl.co. The combination of an untrusted remote host, lack of validation/authentication, and a network call that could leak sensitive data makes this unsuitable for production or for inclusion without review. The broken 'command' function adds further concern about code quality or tampering. Recommend removing or replacing the remote endpoint, adding strict input validation and authentication, and fixing the broken helper; if this file appears unexpectedly in a dependency tree, treat the package as suspicious and investigate the publisher and integrity (checksums/signatures).

graphspy

1.4.0

Live on pypi

Blocked by Socket

The setup.py itself is benign and not obfuscated, but it packages and exposes an entry point for a project that explicitly advertises itself as an initial access/post-exploitation tool for Azure AD/O365. That makes the overall package high risk. The provided fragment cannot prove active malicious operations, but the declared intent and the entrypoint that will execute undisclosed code at runtime justify treating the package as malicious/unsafe until a full audit of GraphSpy.* modules and bundled assets is performed.

foglet-core

0.5.5

by folkvir

Live on npm

Blocked by Socket

This module contains a critical remote code execution primitive: it deserializes received message.callback using eval and then executes the resulting function, passing in the local foglet instance and emitter. Incoming data is sourced from network/peer messages, and the interpreter also supports remote method dispatch by message.name. Together, these enable attacker-controlled code execution and potential propagation across peers. Treat as extremely dangerous and do not use in untrusted or loosely authenticated peer environments.

ringcentral-embeddable-rcv

99.10.10

Removed from npm

Blocked by Socket

The code engages in potentially malicious behavior by collecting sensitive system information and sending it to a remote server without clear user consent. The hard-coded domain, data obfuscation, and lack of transparency raise significant privacy and security concerns. The risk score is high due to the invasive nature of the code.

Live on npm for 18 minutes before removal. Socket users were protected even while the package was live.

@blocklet/pages-kit

0.4.157

by wangshijun

Live on npm

Blocked by Socket

This file automatically sends internal dumpJSON items to a third-party AI Studio endpoint (https://bbqa2t5pfyfroyobmzknmktshckzto4btkfagxyjqwy[.]did[.]abtnet[.]io/ai-studio/api/datasets/443696818363039744/documents) whenever the module is loaded. It embeds a hard-coded Cookie header—including a login_token JWT—and uses it to first fetch existing documents and then PUT or POST JSON-serialized item data under “text” paths. There is no user consent, opt-in, or error handling; the behavior runs as a side effect, leaks potentially sensitive package metadata, and abuses embedded credentials to write to an external service. This is a high-risk supply-chain/backdoor indicator.

mobilecoder-mcp

2.0.1

Live on npm

Blocked by Socket

This module implements a remote access agent that grants interactive shell control and arbitrary file-read capabilities to any remote party that knows the short numeric secret. Key issues: the encryption key is a low-entropy 6-digit number (guessable/brute-forceable), the relay URL is hard-coded, there is no authentication beyond the shared code, file reads are unrestricted, and environment variables are exposed to the spawned shell. These characteristics make the module high risk in general use and it can be abused for data exfiltration and remote command execution. If intended for legitimate remote support, additional protections are required: stronger key exchange, authenticated peers, allowlisting/sandboxing of filesystem access, logging/visibility, and operator confirmation before granting shell control.

354766/inference-sh-9/skills/youtube-thumbnail-design/

f0e401f3b2a695ebbbdc7720b8a3c495713e2d0c

Live on socket

Blocked by Socket

[Skill Scanner] Pipe-to-shell or eval pattern detected All findings: [CRITICAL] command_injection: Pipe-to-shell or eval pattern detected (CI013) [AITech 9.1.4] [CRITICAL] command_injection: Natural language instruction to download and install from URL detected (CI009) [AITech 9.1.4] [CRITICAL] command_injection: Natural language instruction to download and install from URL detected (CI009) [AITech 9.1.4] This skill/instruction doc appears functionally legitimate and aligned with its stated purpose (YouTube thumbnail design using a remote inference CLI). However, it contains moderately high supply-chain risk patterns: a curl|sh installer that downloads and executes a CLI from inference.sh/dist.inference.sh, plus examples that send prompts and (potentially) images and authentication tokens to a third-party service. There are no hardcoded secrets or obfuscated code in the provided text. Recommend treating the installer pattern as risky: prefer pinned, auditable installs (manual checksum verification before execution), clear documentation on where credentials go, and least-privilege CLI invocation. Overall: no clear malware, but medium-to-high supply-chain/security risk due to download-and-execute and credential/ data-forwarding patterns. LLM verification: The SKILL.md is a benign thumbnail-design guide but instructs users to install and use a third-party CLI via a pipe-to-shell pattern and to authenticate that CLI. The immediate risks are supply-chain and credential exposure: executing a remote install script and sending prompts/files/credentials to external inference endpoints. There is no embedded malware in the text itself, but the recommended operational flow is high-risk. Recommendation: do not execute the pipe-to-shell installer without ind

mtmai

0.4.80

Live on pypi

Blocked by Socket

This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.

scilens

0.1.0

Removed from pypi

Blocked by Socket

The module itself is not obviously obfuscated or pre-packed with a secret backdoor, but it enables high-risk behavior: downloading/unzipping arbitrary content and executing it with shell=True, and extracting zip files unsafely. If an attacker can control ExecuteConfig (particularly exe_url, exe_path, exe_unzip_and_use, or command_suffix) or the downloaded resource, they can achieve remote code execution and arbitrary filesystem changes. Recommend treating this module as dangerous in untrusted contexts: enforce strict input validation, verify integrity/signatures of downloads, avoid shell=True by passing args as a list, sanitize zip entries before extractall, and implement cleanup of temp files.

Live on pypi for 2 hours and 44 minutes before removal. Socket users were protected even while the package was live.

pinokiod

0.0.18

by cocktailpeanut

Live on npm

Blocked by Socket

The SweetAlert2 library code is mostly benign and serves as a UI modal dialog tool. However, it contains a suspicious and potentially malicious snippet that targets Russian users on certain domains to play an unsolicited audio prank, disabling pointer events and potentially disrupting user interaction. This behavior is unexpected and should be considered a moderate security risk and potential malware. The rest of the code shows no signs of malicious intent. The provided reports were invalid and unhelpful. Users should be cautious about this version of the library due to the embedded prank behavior.

hackerman

0.6.9

Live on pypi

Blocked by Socket

This module is a high-risk remote-control/backdoor component: it exposes unauthenticated remote command execution (shell, exec, eval), arbitrary file upload and download, and background task creation. It should be treated as malicious/untrusted in most deployment contexts. Do not run this code on production or internet-accessible hosts. Immediate remediation: remove or quarantine the component, revoke any credentials/keys on the host, perform forensic audit for persistence or additional compromise, and block network access to any running instance.

mtmai

0.3.1419

Live on pypi

Blocked by Socket

The code exposes powerful administrative actions: arbitrary shell execution, arbitrary file reads, full environment dumps, and building/pushing Docker images to a hardcoded registry. These are not obfuscated but are high-risk capabilities that can be abused for data exfiltration, remote code execution, and supply-chain leakage if the superuser authentication is compromised or misconfigured. The presence of a hardcoded remote image name for docker push is suspicious for unintended outbound artifact exfiltration. Recommendation: avoid including these endpoints in public packages or ensure strict, auditable authentication and input validation; remove hardcoded push targets and avoid returning full environment variables or arbitrary file contents.

elf-stats-candystriped-cookiejar-799

3.4.3

Live on npm

Blocked by Socket

High-confidence malicious active data exfiltration: the script enumerates and base64-encodes all files under /opt and posts them to a hardcoded external webhook. Treat as confirmed compromise. Remove the code, block the destination domain, investigate systems that executed the module, rotate any credentials that may have been exposed, and perform forensic collection of affected hosts.

354766/draco-agent/tech-news-digest/tech-news-digest/

08201e7e03f80ac9f5117a2d56a23b63f72ae2b4

Live on socket

Blocked by Socket

The OpenClaw and multi-source Tech News Digest footprint present a coherent workflow for aggregating, deduplicating, scoring, enriching, and delivering digests via multiple formats. However, the reliance on numerous environment-stored credentials, optional backends, and a prompt-driven orchestration introduces multiple risk vectors for secret leakage, supply-chain drift, and prompt-injection-like control if templates or prompts are improperly audited. The design is plausible for legitimate use but exhibits medium-to-high supply-chain risk due to credential management complexity, lack of explicit secret rotation, and broad outbound data flows. Recommended improvements include: adopting a centralized secret store with rotation policies, enforcing TLS pinning and strict back-end authentication defaults, implementing per-backend access controls and key rotation, adding explicit data minimization and consent policies, enabling script integrity verification (signing, hashing, pinned dependencies), and auditing the prompt templates (digest-prompt.md) for prompt-injection risk. Overall security risk remains moderate to high until mitigations are in place; malware likelihood remains low given no signs of payload delivery, but misconfigurations could enable data leakage or abuse.

qi9-unlimited-spins-coin-master-hack-paxr

9.0.7

by Kncws

Live on nuget

Blocked by Socket

This file is part of a malicious package that exploits software distribution infrastructure for social engineering attacks. The assembly metadata contains extensive promotional content advertising illegal Snapchat account hacking services, including detailed descriptions of traffic-based attack methods against Snapchat servers. The file directs users to visit an external malicious website at hacksgames[.]online/Snap-Hack/ through embedded URLs in assembly descriptions. While containing no executable malicious code (only empty class implementations), it serves as a delivery mechanism to redirect users to potentially harmful external sites that could distribute malware, conduct phishing attacks, or engage in other malicious activities. This represents supply chain pollution by abusing legitimate package repositories to promote illegal services and poses significant security risks to users who may follow the embedded malicious links.

github.com/open-falcon/falcon-plus

v0.0.0-20170125092511-6483cf5393aa

Live on go

Blocked by Socket

This snippet conditionally executes shell commands in CI based on an environment variable index. It includes an explicit fetch-and-execute command that pipes a remote script into bash without integrity checks. Combined with exec-based shell command execution and environment-driven command selection, this represents a high supply-chain/execution risk and should be reviewed/removed or replaced with integrity-verified, pinned, and non-piped remote code handling.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Git dependency

GitHub dependency

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

Telemetry

Protestware or potentially unwanted behavior

Unstable ownership

55 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a Demo

Questions? Call us at (844) SOCKET-0

Read the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles