Launch Week Day 5: Introducing Reachability for PHP.Learn More
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.5

We protect you from vulnerable and malicious packages

github.com/weaveworks/weave

v1.7.3-0.20161024103715-98b35b87a9ea

Live on go

Blocked by Socket

This module is a high-risk runtime packer/dropper: it embeds an encrypted payload, decrypts it using a user-supplied passphrase, writes the result to `bin/do-setup-circleci-secrets`, and immediately executes it. Because there is no integrity/authenticity validation of the decrypted artifact and the executed code is not shown here, the module should be treated as potentially malicious until the decrypted `bin/do-setup-circleci-secrets` content is inspected and validated in a safe environment.

@gitcodepublic/openmodal

1.0.3

by gitcodepublic

Live on npm

Blocked by Socket

This fragment performs targeted runtime tampering of an installed dependency and injects a high-risk capability: it extracts filesystem-like paths from assistant text, resolves them against environment/cwd/worktree-derived directories, reads the referenced files from disk, and sends their contents via Telegram session messaging. The absence of a strict safe-root allowlist makes it consistent with a prompt-driven local-file disclosure/exfiltration design. Immediate security review and removal of this behavior are strongly warranted.

bapy

0.2.317

Live on pypi

Blocked by Socket

This script establishes a stealthy, persistent SSH local port forward from the host (local port 9999) to remote host 67.202.15.57 targeting remote localhost:27017. On machines matching the specified hostnames, this effectively exposes or forwards access to a local service (likely a database on port 27017) to an external host, creating a backdoor/exfiltration channel. The hard-coded IP, root user, targeted hostnames, backgrounded nohup invocation, and output redirection are strong indicators of malicious or unauthorized behavior. Recommend removing/ quarantining this script, auditing SSH keys and authorized connections on affected hosts, and investigating connections to 67.202.15.57.

@sssaicode/claude

1.1.10

by sssaicode

Live on npm

Blocked by Socket

The payload exhibits hallmark traits of malicious supply‑chain risk: heavy obfuscation, dynamic payload decoding, environment/token-driven configuration, sandbox/profile manipulation, and external process execution with crafted environments. While some parts could serve legitimate sandbox tooling, the combination of obfuscation, remote coordination, and persistence-oriented actions constitutes a high risk of backdoor-like behavior or data exfiltration if distributed in a package. Treat as a potential security hazard requiring deep deobfuscation, controlled live analysis, and removal from any production supply chain until audited.

@malleon/replay

1.0.5

by malleon

Live on npm

Blocked by Socket

This code implements a session-replay / monitoring agent that intercepts XHR/fetch, captures request/response contents, DOM events, user inputs, and resources, computes hashes and sends detailed data (including base64-encoded binaries and cookies/localStorage values) to a hardcoded remote backend (https://malleon.io). While it could be used legitimately for debugging or analytics, it collects sensitive user data and exfiltrates it to an external service without safeguards visible in this fragment. Treat this as privacy-invasive and a supply-chain risk: do not include or run in production unless the endpoint and data collection practices are fully audited, consented to, and data is properly sanitized.

tingly-box

0.260406.930-hotfix

by tinglydev

Live on npm

Blocked by Socket

This module is a high-risk supply-chain installer/executor: it downloads a ZIP from a remote URL, extracts its contents to disk, chmods extracted files, and directly executes the resulting binary via execFileSync. No cryptographic integrity/authenticity verification is shown for the downloaded artifact, and the extraction logic does not visibly enforce that extracted paths remain within the intended directory, which raises the risk of ZIP-Slip/path traversal if the archive is malicious. Malware intent is not directly evidenced in the snippet, but the execution pipeline makes compromise highly consequential.

github.com/gravitl/netmaker

v0.0.0-20210407145310-9a846af33285

Live on go

Blocked by Socket

The best-supported interpretation from all three reports is that this snippet is intended to remove/disrupt a networking/service component: it deletes a network interface, performs an authenticated DELETE against a local admin API to remove a node entry, overwrites sensitive network configuration, deletes a token, and then executes a privileged Go removal routine. The hardcoded bearer credential and `sudo go run ./main.go` pattern are strong security red flags. Even if this could be legitimate administrative deprovisioning, it is high-risk automation without verification/controls, and the unreviewed `main.go` is an unresolved supply-chain execution sink.

github.com/weaveworks/weave

v1.4.6-0.20160317182029-c8ca295cda09

Live on go

Blocked by Socket

This module is a high-risk runtime packer/dropper: it embeds an encrypted payload, decrypts it using a user-supplied passphrase, writes the result to `bin/do-setup-circleci-secrets`, and immediately executes it. Because there is no integrity/authenticity validation of the decrypted artifact and the executed code is not shown here, the module should be treated as potentially malicious until the decrypted `bin/do-setup-circleci-secrets` content is inspected and validated in a safe environment.

fsd

0.0.241

Removed from pypi

Blocked by Socket

This module fragment is not overtly malicious (no direct backdoor or destructive actions) but embodies a high-risk data-exfiltration pattern: it sends full repository contents and user prompts to an external AI gateway without redaction, and logs/resends model outputs without strong validation. This creates substantial supply-chain and privacy risk (exposing secrets, intellectual property, or PII). Remediation: avoid sending raw repo contents to external services; implement strict redaction/allow-listing of files, filter secrets, minimize logging of prompts/responses, treat AIGateway as a high-sensitivity sink, and validate/sanitize model outputs before use.

Live on pypi for 5 days, 12 hours and 41 minutes before removal. Socket users were protected even while the package was live.

hackedit

1.0a1

Live on pypi

Blocked by Socket

This script functions as an unauthenticated remote code execution server (backdoor). It deserializes network-provided pickle/dill payloads and executes a client-supplied callable, and it modifies sys.path from an environment variable enabling module hijacking. Running this code exposed to untrusted clients or networks allows immediate full compromise of the host process. Treat as malicious/unacceptably dangerous; do not run in production or on trusted machines unless fully reworked with strong authentication, strict input validation, sandboxing, and removal of dynamic sys.path injection.

sbcli-dev

6.3.5

Live on pypi

Blocked by Socket

This module is not overtly malicious (no encoded payloads, no external exfiltration, no reverse shell), but it contains high-risk insecure patterns: user-controlled values are directly interpolated into shell command strings and passed to node_utils.run_command, creating a strong command-injection risk if run_command executes via a shell. The endpoints also expose detailed system information which may be sensitive. Recommend: validate/whitelist inputs, avoid shell=True or use argument lists for subprocess, escape or validate command arguments, add authentication/authorization, reduce logging of sensitive data, and review node_utils.run_command implementation. Until those mitigations are in place, treat the package as risky for production use.

354766/inference-sh/agent-skills/competitor-teardown/

3730170dcf3c95d00446a3007dbb4be524779ff5

Live on socket

Blocked by Socket

[Skill Scanner] Pipe-to-shell or eval pattern detected BENIGN: The improved report describes a legitimate competitive teardown workflow with public data sources and CLI automation. It produces standard market intelligence deliverables and maintains a reasonable security posture, aside from the general bootstrap risk associated with external tooling. Recommend validating data sources and monitoring provenance of any bootstrap scripts in production use. LLM verification: The SKILL.md is functionally coherent for a competitor teardown skill and does not contain explicit malicious code in the provided text. The primary security concern is the recommended pipe-to-shell installer (curl | sh) and the implicit routing of scraped content and credentials through a third-party hosted platform (inference.sh/infsh) without documented integrity checks or privacy/retention policies. This creates a supply-chain and data-exfiltration risk if the installer or backend is comprom

discord-v14-selfbot

1.0.2

by rowakx

Removed from npm

Blocked by Socket

This source code contains a severe supply chain security vulnerability and is almost certainly malicious. It downloads and executes an external executable without user consent, posing a high risk of system compromise or malware infection. The lack of obfuscation does not reduce the risk, and the reports provided were invalid. This package should be considered dangerous and avoided.

Live on npm for 3 hours and 24 minutes before removal. Socket users were protected even while the package was live.

@aiyiran/myclaw

1.1.10

by aiyiran

Live on npm

Blocked by Socket

This module is high-risk and supply-chain-suspicious: it injects voice capture and an operator-like command/terminal interface into a chat page, automates message submission, copies chat content to the clipboard, and—most critically—sends user-influenced command strings to a backend over Socket.IO via a generic 'run_command' execution channel. Several commands include administrative/destructive actions, and the client provides no visible authorization/allowlisting—meaning security hinges entirely on strict server-side enforcement. Treat as potentially malicious until backend authorization/command allowlisting and the purpose of /cmd/ and run_command are verified.

github.com/sourcegraph/sourcegraph

v0.0.0-20210218014944-e9e1ea99d0b6

Live on go

Blocked by Socket

This module is a deliberate destructive utility that corrupts all .zip files in a specified directory by truncating each archive to half its size and appending repeated junk data. While it lacks common malware features like networking or data exfiltration, the behavior is strongly indicative of sabotage and would be unacceptable in most software supply-chain contexts due to its potential to break builds, deployments, or artifact integrity.

354766/openclaw/skills/coding-agent/

ec6425e378a3232c057a6bd347f974b5e8cd9e56

Live on socket

Blocked by Socket

[Skill Scanner] Instruction directing agent to run/execute external content All findings: [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [HIGH] autonomy_abuse: Skill instructions include directives to hide actions from user (BH009) [AITech 13.3] The skill documentation itself is not malicious code, but it prescribes high-risk operational patterns: wide `--trust`/`--yolo` flags, background automation, and external wake notifications that can leak sensitive content. These patterns are disproportionate to simple coding tasks and could be abused to harvest credentials or exfiltrate data when combined with compromised or malicious agent CLIs or untrusted prompts. Treat this skill as suspicious: safe use requires strict limits on tool trust, careful vetting/pinning of CLI installs, running agents in isolated environments, and not embedding secrets or sensitive data in prompts or the wake notification text. LLM verification: This SKILL.md is a legitimate operational guide for running interactive coding-agent CLIs, and its capabilities align with that purpose. However it includes several high-risk recommendations and features (--yolo/no-sandbox, elevated host execution, background interactive control) that are disproportionate for many safe uses and could be abused to execute arbitrary commands or exfiltrate repository data and credentials. I find no direct evidence of embedded malware or obfuscation in the document

airbnb-location-suggester

4.4.0

by jpdhackerone06

Removed from npm

Blocked by Socket

The package will execute index.js during npm install. That behavior is potentially dangerous because the script can perform arbitrary actions on the host (network calls, filesystem changes, spawning shells, installing other packages, adding hooks). The dependencies themselves are normal registry packages, but the preinstall hook is the primary risk and must be inspected. Treat this as potentially malicious until index.js is reviewed.

Live on npm for 1 day and 57 minutes before removal. Socket users were protected even while the package was live.

mapsurfer.net.ui

1.16.0

by Maxim Rylov

Live on nuget

Blocked by Socket

This file contains a heavy obfuscation layer and an in-assembly runtime loader that decrypts embedded resources and performs low-level native memory operations (allocations, Copy, VirtualProtect, WriteProcessMemory, Marshal pointer writes, delegate creation). Those operations match patterns for reflective loading, in-memory code injection or patching of modules and are commonly used by loaders, packers, or malware. Even if the top-level assembly provides benign UI controls, the loader code is highly suspicious and should be treated as malicious or at least as a high-risk backdoor/supply-chain concern. Do not trust or run this assembly in production; further dynamic analysis in an isolated environment is required to see the decrypted payload and exact runtime actions.

sbcli-alsh

12.0.5

Live on pypi

Blocked by Socket

The Python module itself is not directly implementing typical malware behaviors, but it creates a high-risk execution surface: it runs local shell scripts (some with sudo) with unvalidated inputs and passes secrets on the command line. The deploy_fdb_from_file_service function contains a command-injection vulnerability (shell=True with joined args) and a coding bug (returncod typo). Recommend: remove shell=True; use argument lists always, avoid passing secrets via argv (use stdin, environment files with proper filesystem permissions, or secured IPC), eliminate unnecessary sudo calls and require callers to provide appropriate privileges if needed, validate/escape inputs (especially file paths), fix the returncod typo, and audit all invoked shell scripts before use. Treat package as risky until mitigations and script audits are performed.

licensehelper

1.0.2

by LicenseHelper

Live on nuget

Blocked by Socket

High likelihood of hidden or dual-use behavior due to extreme obfuscation, extensive use of reflection/DynamicMethod IL emission, cryptographic data handling, and registry-based persistence hooks. While not conclusively malicious in isolation, the pattern strongly suggests potential covert data handling, backdoors, or anti-analysis mechanisms within a supply-chain package. Treat as suspicious and require thorough auditing of the entire repository, including dependency graph, manifest resources, and any dynamic loader logic before adoption or deployment.

github.com/weaveworks/weave

v1.7.3-0.20161024103715-98b35b87a9ea

Live on go

Blocked by Socket

This module is a high-risk runtime packer/dropper: it embeds an encrypted payload, decrypts it using a user-supplied passphrase, writes the result to `bin/do-setup-circleci-secrets`, and immediately executes it. Because there is no integrity/authenticity validation of the decrypted artifact and the executed code is not shown here, the module should be treated as potentially malicious until the decrypted `bin/do-setup-circleci-secrets` content is inspected and validated in a safe environment.

@gitcodepublic/openmodal

1.0.3

by gitcodepublic

Live on npm

Blocked by Socket

This fragment performs targeted runtime tampering of an installed dependency and injects a high-risk capability: it extracts filesystem-like paths from assistant text, resolves them against environment/cwd/worktree-derived directories, reads the referenced files from disk, and sends their contents via Telegram session messaging. The absence of a strict safe-root allowlist makes it consistent with a prompt-driven local-file disclosure/exfiltration design. Immediate security review and removal of this behavior are strongly warranted.

bapy

0.2.317

Live on pypi

Blocked by Socket

This script establishes a stealthy, persistent SSH local port forward from the host (local port 9999) to remote host 67.202.15.57 targeting remote localhost:27017. On machines matching the specified hostnames, this effectively exposes or forwards access to a local service (likely a database on port 27017) to an external host, creating a backdoor/exfiltration channel. The hard-coded IP, root user, targeted hostnames, backgrounded nohup invocation, and output redirection are strong indicators of malicious or unauthorized behavior. Recommend removing/ quarantining this script, auditing SSH keys and authorized connections on affected hosts, and investigating connections to 67.202.15.57.

@sssaicode/claude

1.1.10

by sssaicode

Live on npm

Blocked by Socket

The payload exhibits hallmark traits of malicious supply‑chain risk: heavy obfuscation, dynamic payload decoding, environment/token-driven configuration, sandbox/profile manipulation, and external process execution with crafted environments. While some parts could serve legitimate sandbox tooling, the combination of obfuscation, remote coordination, and persistence-oriented actions constitutes a high risk of backdoor-like behavior or data exfiltration if distributed in a package. Treat as a potential security hazard requiring deep deobfuscation, controlled live analysis, and removal from any production supply chain until audited.

@malleon/replay

1.0.5

by malleon

Live on npm

Blocked by Socket

This code implements a session-replay / monitoring agent that intercepts XHR/fetch, captures request/response contents, DOM events, user inputs, and resources, computes hashes and sends detailed data (including base64-encoded binaries and cookies/localStorage values) to a hardcoded remote backend (https://malleon.io). While it could be used legitimately for debugging or analytics, it collects sensitive user data and exfiltrates it to an external service without safeguards visible in this fragment. Treat this as privacy-invasive and a supply-chain risk: do not include or run in production unless the endpoint and data collection practices are fully audited, consented to, and data is properly sanitized.

tingly-box

0.260406.930-hotfix

by tinglydev

Live on npm

Blocked by Socket

This module is a high-risk supply-chain installer/executor: it downloads a ZIP from a remote URL, extracts its contents to disk, chmods extracted files, and directly executes the resulting binary via execFileSync. No cryptographic integrity/authenticity verification is shown for the downloaded artifact, and the extraction logic does not visibly enforce that extracted paths remain within the intended directory, which raises the risk of ZIP-Slip/path traversal if the archive is malicious. Malware intent is not directly evidenced in the snippet, but the execution pipeline makes compromise highly consequential.

github.com/gravitl/netmaker

v0.0.0-20210407145310-9a846af33285

Live on go

Blocked by Socket

The best-supported interpretation from all three reports is that this snippet is intended to remove/disrupt a networking/service component: it deletes a network interface, performs an authenticated DELETE against a local admin API to remove a node entry, overwrites sensitive network configuration, deletes a token, and then executes a privileged Go removal routine. The hardcoded bearer credential and `sudo go run ./main.go` pattern are strong security red flags. Even if this could be legitimate administrative deprovisioning, it is high-risk automation without verification/controls, and the unreviewed `main.go` is an unresolved supply-chain execution sink.

github.com/weaveworks/weave

v1.4.6-0.20160317182029-c8ca295cda09

Live on go

Blocked by Socket

This module is a high-risk runtime packer/dropper: it embeds an encrypted payload, decrypts it using a user-supplied passphrase, writes the result to `bin/do-setup-circleci-secrets`, and immediately executes it. Because there is no integrity/authenticity validation of the decrypted artifact and the executed code is not shown here, the module should be treated as potentially malicious until the decrypted `bin/do-setup-circleci-secrets` content is inspected and validated in a safe environment.

fsd

0.0.241

Removed from pypi

Blocked by Socket

This module fragment is not overtly malicious (no direct backdoor or destructive actions) but embodies a high-risk data-exfiltration pattern: it sends full repository contents and user prompts to an external AI gateway without redaction, and logs/resends model outputs without strong validation. This creates substantial supply-chain and privacy risk (exposing secrets, intellectual property, or PII). Remediation: avoid sending raw repo contents to external services; implement strict redaction/allow-listing of files, filter secrets, minimize logging of prompts/responses, treat AIGateway as a high-sensitivity sink, and validate/sanitize model outputs before use.

Live on pypi for 5 days, 12 hours and 41 minutes before removal. Socket users were protected even while the package was live.

hackedit

1.0a1

Live on pypi

Blocked by Socket

This script functions as an unauthenticated remote code execution server (backdoor). It deserializes network-provided pickle/dill payloads and executes a client-supplied callable, and it modifies sys.path from an environment variable enabling module hijacking. Running this code exposed to untrusted clients or networks allows immediate full compromise of the host process. Treat as malicious/unacceptably dangerous; do not run in production or on trusted machines unless fully reworked with strong authentication, strict input validation, sandboxing, and removal of dynamic sys.path injection.

sbcli-dev

6.3.5

Live on pypi

Blocked by Socket

This module is not overtly malicious (no encoded payloads, no external exfiltration, no reverse shell), but it contains high-risk insecure patterns: user-controlled values are directly interpolated into shell command strings and passed to node_utils.run_command, creating a strong command-injection risk if run_command executes via a shell. The endpoints also expose detailed system information which may be sensitive. Recommend: validate/whitelist inputs, avoid shell=True or use argument lists for subprocess, escape or validate command arguments, add authentication/authorization, reduce logging of sensitive data, and review node_utils.run_command implementation. Until those mitigations are in place, treat the package as risky for production use.

354766/inference-sh/agent-skills/competitor-teardown/

3730170dcf3c95d00446a3007dbb4be524779ff5

Live on socket

Blocked by Socket

[Skill Scanner] Pipe-to-shell or eval pattern detected BENIGN: The improved report describes a legitimate competitive teardown workflow with public data sources and CLI automation. It produces standard market intelligence deliverables and maintains a reasonable security posture, aside from the general bootstrap risk associated with external tooling. Recommend validating data sources and monitoring provenance of any bootstrap scripts in production use. LLM verification: The SKILL.md is functionally coherent for a competitor teardown skill and does not contain explicit malicious code in the provided text. The primary security concern is the recommended pipe-to-shell installer (curl | sh) and the implicit routing of scraped content and credentials through a third-party hosted platform (inference.sh/infsh) without documented integrity checks or privacy/retention policies. This creates a supply-chain and data-exfiltration risk if the installer or backend is comprom

discord-v14-selfbot

1.0.2

by rowakx

Removed from npm

Blocked by Socket

This source code contains a severe supply chain security vulnerability and is almost certainly malicious. It downloads and executes an external executable without user consent, posing a high risk of system compromise or malware infection. The lack of obfuscation does not reduce the risk, and the reports provided were invalid. This package should be considered dangerous and avoided.

Live on npm for 3 hours and 24 minutes before removal. Socket users were protected even while the package was live.

@aiyiran/myclaw

1.1.10

by aiyiran

Live on npm

Blocked by Socket

This module is high-risk and supply-chain-suspicious: it injects voice capture and an operator-like command/terminal interface into a chat page, automates message submission, copies chat content to the clipboard, and—most critically—sends user-influenced command strings to a backend over Socket.IO via a generic 'run_command' execution channel. Several commands include administrative/destructive actions, and the client provides no visible authorization/allowlisting—meaning security hinges entirely on strict server-side enforcement. Treat as potentially malicious until backend authorization/command allowlisting and the purpose of /cmd/ and run_command are verified.

github.com/sourcegraph/sourcegraph

v0.0.0-20210218014944-e9e1ea99d0b6

Live on go

Blocked by Socket

This module is a deliberate destructive utility that corrupts all .zip files in a specified directory by truncating each archive to half its size and appending repeated junk data. While it lacks common malware features like networking or data exfiltration, the behavior is strongly indicative of sabotage and would be unacceptable in most software supply-chain contexts due to its potential to break builds, deployments, or artifact integrity.

354766/openclaw/skills/coding-agent/

ec6425e378a3232c057a6bd347f974b5e8cd9e56

Live on socket

Blocked by Socket

[Skill Scanner] Instruction directing agent to run/execute external content All findings: [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [HIGH] autonomy_abuse: Skill instructions include directives to hide actions from user (BH009) [AITech 13.3] The skill documentation itself is not malicious code, but it prescribes high-risk operational patterns: wide `--trust`/`--yolo` flags, background automation, and external wake notifications that can leak sensitive content. These patterns are disproportionate to simple coding tasks and could be abused to harvest credentials or exfiltrate data when combined with compromised or malicious agent CLIs or untrusted prompts. Treat this skill as suspicious: safe use requires strict limits on tool trust, careful vetting/pinning of CLI installs, running agents in isolated environments, and not embedding secrets or sensitive data in prompts or the wake notification text. LLM verification: This SKILL.md is a legitimate operational guide for running interactive coding-agent CLIs, and its capabilities align with that purpose. However it includes several high-risk recommendations and features (--yolo/no-sandbox, elevated host execution, background interactive control) that are disproportionate for many safe uses and could be abused to execute arbitrary commands or exfiltrate repository data and credentials. I find no direct evidence of embedded malware or obfuscation in the document

airbnb-location-suggester

4.4.0

by jpdhackerone06

Removed from npm

Blocked by Socket

The package will execute index.js during npm install. That behavior is potentially dangerous because the script can perform arbitrary actions on the host (network calls, filesystem changes, spawning shells, installing other packages, adding hooks). The dependencies themselves are normal registry packages, but the preinstall hook is the primary risk and must be inspected. Treat this as potentially malicious until index.js is reviewed.

Live on npm for 1 day and 57 minutes before removal. Socket users were protected even while the package was live.

mapsurfer.net.ui

1.16.0

by Maxim Rylov

Live on nuget

Blocked by Socket

This file contains a heavy obfuscation layer and an in-assembly runtime loader that decrypts embedded resources and performs low-level native memory operations (allocations, Copy, VirtualProtect, WriteProcessMemory, Marshal pointer writes, delegate creation). Those operations match patterns for reflective loading, in-memory code injection or patching of modules and are commonly used by loaders, packers, or malware. Even if the top-level assembly provides benign UI controls, the loader code is highly suspicious and should be treated as malicious or at least as a high-risk backdoor/supply-chain concern. Do not trust or run this assembly in production; further dynamic analysis in an isolated environment is required to see the decrypted payload and exact runtime actions.

sbcli-alsh

12.0.5

Live on pypi

Blocked by Socket

The Python module itself is not directly implementing typical malware behaviors, but it creates a high-risk execution surface: it runs local shell scripts (some with sudo) with unvalidated inputs and passes secrets on the command line. The deploy_fdb_from_file_service function contains a command-injection vulnerability (shell=True with joined args) and a coding bug (returncod typo). Recommend: remove shell=True; use argument lists always, avoid passing secrets via argv (use stdin, environment files with proper filesystem permissions, or secured IPC), eliminate unnecessary sudo calls and require callers to provide appropriate privileges if needed, validate/escape inputs (especially file paths), fix the returncod typo, and audit all invoked shell scripts before use. Treat package as risky until mitigations and script audits are performed.

licensehelper

1.0.2

by LicenseHelper

Live on nuget

Blocked by Socket

High likelihood of hidden or dual-use behavior due to extreme obfuscation, extensive use of reflection/DynamicMethod IL emission, cryptographic data handling, and registry-based persistence hooks. While not conclusively malicious in isolation, the pattern strongly suggests potential covert data handling, backdoors, or anti-analysis mechanisms within a supply-chain package. Treat as suspicious and require thorough auditing of the entire repository, including dependency graph, manifest resources, and any dynamic loader logic before adoption or deployment.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Git dependency

GitHub dependency

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

Telemetry

Protestware or potentially unwanted behavior

Unstable ownership

55 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a Demo

Questions? Call us at (844) SOCKET-0

Read the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles