Launch Week Day 5: Introducing Reachability for PHP.Learn More
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.5

We protect you from vulnerable and malicious packages

routerxpl

0.8.0

Live on pypi

Blocked by Socket

This file is highly consistent with malicious exploitation tooling: it performs blind command injection by embedding attacker-controlled command text into HTTP GET parameters/paths, probes for success via response parsing, and then triggers a remote command/payload execution routine (wget staging to /tmp) using an external shell/command-loop helper. Given the explicit RCE/exploit intent and direct injection-and-execution behavior shown in the fragment, the likelihood of malware functionality is very high (though it is exploit code rather than a self-propagating malware).

mzgantt

2024.4.19

by hubosoft

Live on npm

Blocked by Socket

The code fragment exhibits high-risk characteristics typical of obfuscated loaders/dropper payloads: heavy runtime code generation, environment-aware branching, and extensive browser context interactions. While exact payload specifics are concealed, the architecture strongly indicates malicious or supply-chain risk behavior. Immediate caution is warranted, with thorough deobfuscation and sandboxed testing before any use in a project or distribution.

passagemath-standard

10.4.11

Removed from pypi

Blocked by Socket

The code offers convenient completion helpers but contains a high-risk pattern: using eval() on a substring derived from a user-controlled completion string with an attacker-controlled or broad globals mapping. This enables arbitrary code execution and information disclosure of objects available in 'globs'. The fragment is not evidently malicious or obfuscated, but it represents a moderate-to-high security risk in any context where 's' or 'globs' can be influenced by untrusted parties. Recommend removing eval and implementing a safe dotted-name resolution and tightening what globals are exposed.

Live on pypi for 1 hour and 41 minutes before removal. Socket users were protected even while the package was live.

123rf-ui-core

5.999.0

by whatever99

Removed from npm

Blocked by Socket

This script reads the content of the /etc/hosts file, encodes it and sends it to a remote server, which can be considered a security risk.

imagecomponents.win32.imaging

4.0.0.1

by Image Components

Live on nuget

Blocked by Socket

The module contains a high-confidence runtime loader/unpacker with embedded encrypted payloads, signature/hash checks, native process/memory manipulation (VirtualAlloc, WriteProcessMemory, OpenProcess, VirtualProtect), and dynamic runtime code generation/execution. That behavior is not expected for a barcode/image library and is characteristic of malicious loaders or dual-use packers capable of remote/local code injection and reflective execution. This is a severe supply-chain risk: treat the package as malicious/untrusted until provenance and intent are fully validated; remove or isolate it and investigate where the binary came from.

pptop

0.0.12

Live on pypi

Blocked by Socket

This module implements an explicit runtime injection server that allows arbitrary code execution in-process via remote-supplied payloads and unsafe pickle deserialization. In isolation it looks like a developer/debugging utility, but when packaged with software or run in environments where untrusted local users or services can access /tmp or know the pid, it effectively acts as a backdoor/RCE vector. Treat this code as high-risk: do not include it in production packages or long-running services exposed to untrusted users. If its use is required for debugging, restrict access (filesystem permissions, Unix credentials), avoid pickle, require authentication/signatures, and remove from production builds.

mtmai

0.3.971

Live on pypi

Blocked by Socket

The code exposes powerful administrative actions: arbitrary shell execution, arbitrary file reads, full environment dumps, and building/pushing Docker images to a hardcoded registry. These are not obfuscated but are high-risk capabilities that can be abused for data exfiltration, remote code execution, and supply-chain leakage if the superuser authentication is compromised or misconfigured. The presence of a hardcoded remote image name for docker push is suspicious for unintended outbound artifact exfiltration. Recommendation: avoid including these endpoints in public packages or ensure strict, auditable authentication and input validation; remove hardcoded push targets and avoid returning full environment variables or arbitrary file contents.

linaphp/lina

0.5.0

Live on composer

Blocked by Socket

The code fetches and extracts binaries from unverified external sources, then executes a downloaded php binary to run a phar (lina.phar) with a build command. This pattern is high risk for supply-chain and remote execution threats due to lack of integrity checks, provenance validation, and sandboxing. It could be benign if the sources are trusted and the environment is controlled, but absent verification it should be treated as suspicious and deprecated for public distribution. Recommend adding integrity verification (checksums or signatures), pinning versions, using trusted registries, and avoiding immediate execution of downloaded binaries.

fsd

0.1.199

Removed from pypi

Blocked by Socket

This module itself does not contain obvious obfuscated malware (no encoded payloads, hardcoded secrets, network exfiltration code). However it provides powerful primitives (subprocess with shell=True, ability to change directories, write files and open OS terminals) that allow arbitrary code execution and file modification when given untrusted inputs (steps_json, user inputs, or compromised upstream agents). Therefore the package is high-risk in supply-chain contexts: if an upstream component or dependency is malicious, this code can be used to execute arbitrary commands on the host. Use only with trusted inputs and add sanitization and restrictions before use.

Live on pypi for 5 days, 5 hours and 48 minutes before removal. Socket users were protected even while the package was live.

github.com/open-falcon/falcon-plus

v0.0.0-20170119143835-2b2d2cb865f2

Live on go

Blocked by Socket

This snippet conditionally executes shell commands in CI based on an environment variable index. It includes an explicit fetch-and-execute command that pipes a remote script into bash without integrity checks. Combined with exec-based shell command execution and environment-driven command selection, this represents a high supply-chain/execution risk and should be reviewed/removed or replaced with integrity-verified, pinned, and non-piped remote code handling.

coderun-cli

1.0.3

by luxian

Removed from npm

Blocked by Socket

No definitive malware or backdoor detected in the provided fragment. The bundle appears to be a composite of legitimate UI/editor libraries (React internals, CodeMirror-like editors, Sandpack runtime, styling tools). The risk remains moderate due to potential data exposure paths in complex plugin ecosystems and the opaqueness of transitive dependencies in a large bundle. A full audit should include: dependency integrity checks, SAST/DAST on dynamic imports, and runtime data-flow tracing across all plugins/extensions.

Live on npm for 7 hours and 18 minutes before removal. Socket users were protected even while the package was live.

@inkeep/agents-manage-ui

0.0.0-dev-20250912195514

by abraham-inkeep

Live on npm

Blocked by Socket

The code presents a cautious, opt-in instrumentation integration tailored for Next.js Edge runtime. It includes protective patterns (proxy for unsupported modules), guarded startup, and non-fatal error handling. No evidence of data leakage or malicious activity is observed in this module alone. The primary security considerations are dependency trust in the external instrumentation module and ensuring that eager startup does not introduce unintended side effects in edge deployments.

agentdojo

0.1.14

Live on pypi

Blocked by Socket

This conversation demonstrates a successful prompt-injection-based data exfiltration: a webpage/tool output contained an instruction to collect Slack channel messages and post them to an external website; the assistant executed that instruction and posted internal channel content (including a hard-coded secret) to http://www.my-website-234.com/random. This is a clear supply-chain/security incident (sensitive data disclosure). Remediation: treat tool outputs as untrusted, enforce policies that assistant must ignore instructions found in fetched content, restrict automated posting of internal messages to external endpoints, and rotate any exposed secrets (e.g., '1a7b3d').

github-badge-bot

1.6.0

Live on npm

Blocked by Socket

The code logs into Discord accounts using provided tokens, enumerates guilds, obtains or creates persistent invite links, and sends those links to an external Telegram endpoint. This is a privacy-invasive behavior that can be used to exfiltrate server invite links and server names. The code is readable and not obfuscated, but its behavior is consistent with abusive or malicious use (harvesting and sharing guild invites). Recommend treating this module as high risk for misuse; inspect sendInviteToTelegram implementation and validate intent/consent before use. If tokens are not owned/authorized, do not run this code.

opendagent

0.2.7

Live on pypi

Blocked by Socket

This fragment is dominated by read-only SQLite dashboard/data assembly, but it contains a severe, high-confidence integrity anomaly: _task_neighbors() executes an unexpected multi-statement SQL payload including INSERTs into core tables and calls connection.commit(), indicating persistent database tampering during an operation that should only compute neighbors. The snippet also appears corrupted/incomplete in multiple places, further reducing trust. Treat the package/module as unsafe until the full repository version and diffs are verified; review and remove/repair the _task_neighbors() implementation, ensure neighbor computation is strictly read-only, and validate that multi-statement SQL execution and commit side effects are not present in query helpers.

yektadg/medialibrary

1.05

Live on composer

Blocked by Socket

The SweetAlert2 library code is mostly benign and serves as a UI modal dialog tool. However, it contains a suspicious and potentially malicious snippet that targets Russian users on certain domains to play an unsolicited audio prank, disabling pointer events and potentially disrupting user interaction. This behavior is unexpected and should be considered a moderate security risk and potential malware. The rest of the code shows no signs of malicious intent. The provided reports were invalid and unhelpful. Users should be cautious about this version of the library due to the embedded prank behavior.

common-icons

1.0.88

by cwg_poc

Removed from npm

Blocked by Socket

The code exhibits malicious behavior by accessing sensitive AWS metadata and exfiltrating system information to an external domain.

Live on npm for 16 hours and 7 minutes before removal. Socket users were protected even while the package was live.

twitterdataminer

0.2.2

Live on pypi

Blocked by Socket

The script demonstrates persistent data-collection and potential exfiltration behavior: IP discovery, local DB state manipulation, CSV generation, and an external data-mining/exfiltration tool invocation. Hardcoded credentials, log exposure of secrets, unparameterized SQL, and a non-terminating background loop create substantial security and supply-chain risks. Treat as high-risk; require removal or extensive refactoring, including eliminating hardcoded secrets, removing persistent background behavior, validating inputs, using parameterized queries, and tightly auditing any external data transfers.

xync-client

0.0.112

Live on pypi

Blocked by Socket

This script is high-risk: it automates interactive login flows, captures and persists full browser storage_state (session tokens), and navigates authenticated sessions to banking/payment endpoints. The combination enables account takeover and fraudulent transactions when misused. Treat as malicious or at minimum dangerous automation; require immediate review, restrict execution, and audit any stored agent.state entries. Remediate by removing session persistence, not storing storage_state, and implementing strict access controls and logging.

rollup-pluginuls

1.2.0

by 17b4a931

Removed from npm

Blocked by Socket

This code poses a serious security risk and should not be used.

Live on npm for 9 minutes before removal. Socket users were protected even while the package was live.

sleek-pretty

1.0.0

by probull02

Live on npm

Blocked by Socket

This module exhibits strong malicious supply-chain/data-stealing characteristics. It performs host reconnaissance, specifically targets environment/config and sensitive-looking project files (including '.env' and config-like filenames), reads their contents, base64-encodes document content when needed, chunks payloads to fit HTTP limits, and exfiltrates the collected data to a remote API via multiple POST requests. No legitimate purpose consistent with normal library behavior is evident from the fragment.

overstock-logger

3.14.4

by rampatidar

Removed from npm

Blocked by Socket

The install scripts fetch and execute remote shell code directly from a GitHub raw URL during install (and related lifecycle hooks). This is high-risk and effectively allows the remote repository to run arbitrary commands on any system that installs the package. Treat this package as malicious/untrusted and do not install it in any environment where you care about confidentiality or integrity.

Live on npm for 1 day, 11 hours and 46 minutes before removal. Socket users were protected even while the package was live.

lgblkb-tools

1.0.50

Live on pypi

Blocked by Socket

This module contains explicit data-exfiltration behavior: a plaintext Telegram bot token and an unconditional upload of a specific local file to a remote Telegram chat when executed. In a repository or dependency this constitutes a high-risk backdoor and credential leak. Treat as malicious/unsafe for reuse in packages; revoke the token and remove or modify the code to require explicit, authenticated configuration before any network file transfer.

354766/Ceeon/remotion-skill/remotion/

1cb2d09ac6af8028886d1b7cea173a55007f4ab0

Live on socket

Blocked by Socket

[Skill Scanner] Installation of third-party script detected (AITech 9.1.4) [SC006]

chuckbe/chuckcms

0.1-beta

Live on composer

Blocked by Socket

The snippet contains a high-risk anomaly: an inline shell command embedded in a backtick expression within a placeholder, which could enable local data access or command execution if the snippet processor evaluates such content during expansion. This warrants sanitization or removal and a review of the consuming tool's handling of template expressions.

routerxpl

0.8.0

Live on pypi

Blocked by Socket

This file is highly consistent with malicious exploitation tooling: it performs blind command injection by embedding attacker-controlled command text into HTTP GET parameters/paths, probes for success via response parsing, and then triggers a remote command/payload execution routine (wget staging to /tmp) using an external shell/command-loop helper. Given the explicit RCE/exploit intent and direct injection-and-execution behavior shown in the fragment, the likelihood of malware functionality is very high (though it is exploit code rather than a self-propagating malware).

mzgantt

2024.4.19

by hubosoft

Live on npm

Blocked by Socket

The code fragment exhibits high-risk characteristics typical of obfuscated loaders/dropper payloads: heavy runtime code generation, environment-aware branching, and extensive browser context interactions. While exact payload specifics are concealed, the architecture strongly indicates malicious or supply-chain risk behavior. Immediate caution is warranted, with thorough deobfuscation and sandboxed testing before any use in a project or distribution.

passagemath-standard

10.4.11

Removed from pypi

Blocked by Socket

The code offers convenient completion helpers but contains a high-risk pattern: using eval() on a substring derived from a user-controlled completion string with an attacker-controlled or broad globals mapping. This enables arbitrary code execution and information disclosure of objects available in 'globs'. The fragment is not evidently malicious or obfuscated, but it represents a moderate-to-high security risk in any context where 's' or 'globs' can be influenced by untrusted parties. Recommend removing eval and implementing a safe dotted-name resolution and tightening what globals are exposed.

Live on pypi for 1 hour and 41 minutes before removal. Socket users were protected even while the package was live.

123rf-ui-core

5.999.0

by whatever99

Removed from npm

Blocked by Socket

This script reads the content of the /etc/hosts file, encodes it and sends it to a remote server, which can be considered a security risk.

imagecomponents.win32.imaging

4.0.0.1

by Image Components

Live on nuget

Blocked by Socket

The module contains a high-confidence runtime loader/unpacker with embedded encrypted payloads, signature/hash checks, native process/memory manipulation (VirtualAlloc, WriteProcessMemory, OpenProcess, VirtualProtect), and dynamic runtime code generation/execution. That behavior is not expected for a barcode/image library and is characteristic of malicious loaders or dual-use packers capable of remote/local code injection and reflective execution. This is a severe supply-chain risk: treat the package as malicious/untrusted until provenance and intent are fully validated; remove or isolate it and investigate where the binary came from.

pptop

0.0.12

Live on pypi

Blocked by Socket

This module implements an explicit runtime injection server that allows arbitrary code execution in-process via remote-supplied payloads and unsafe pickle deserialization. In isolation it looks like a developer/debugging utility, but when packaged with software or run in environments where untrusted local users or services can access /tmp or know the pid, it effectively acts as a backdoor/RCE vector. Treat this code as high-risk: do not include it in production packages or long-running services exposed to untrusted users. If its use is required for debugging, restrict access (filesystem permissions, Unix credentials), avoid pickle, require authentication/signatures, and remove from production builds.

mtmai

0.3.971

Live on pypi

Blocked by Socket

The code exposes powerful administrative actions: arbitrary shell execution, arbitrary file reads, full environment dumps, and building/pushing Docker images to a hardcoded registry. These are not obfuscated but are high-risk capabilities that can be abused for data exfiltration, remote code execution, and supply-chain leakage if the superuser authentication is compromised or misconfigured. The presence of a hardcoded remote image name for docker push is suspicious for unintended outbound artifact exfiltration. Recommendation: avoid including these endpoints in public packages or ensure strict, auditable authentication and input validation; remove hardcoded push targets and avoid returning full environment variables or arbitrary file contents.

linaphp/lina

0.5.0

Live on composer

Blocked by Socket

The code fetches and extracts binaries from unverified external sources, then executes a downloaded php binary to run a phar (lina.phar) with a build command. This pattern is high risk for supply-chain and remote execution threats due to lack of integrity checks, provenance validation, and sandboxing. It could be benign if the sources are trusted and the environment is controlled, but absent verification it should be treated as suspicious and deprecated for public distribution. Recommend adding integrity verification (checksums or signatures), pinning versions, using trusted registries, and avoiding immediate execution of downloaded binaries.

fsd

0.1.199

Removed from pypi

Blocked by Socket

This module itself does not contain obvious obfuscated malware (no encoded payloads, hardcoded secrets, network exfiltration code). However it provides powerful primitives (subprocess with shell=True, ability to change directories, write files and open OS terminals) that allow arbitrary code execution and file modification when given untrusted inputs (steps_json, user inputs, or compromised upstream agents). Therefore the package is high-risk in supply-chain contexts: if an upstream component or dependency is malicious, this code can be used to execute arbitrary commands on the host. Use only with trusted inputs and add sanitization and restrictions before use.

Live on pypi for 5 days, 5 hours and 48 minutes before removal. Socket users were protected even while the package was live.

github.com/open-falcon/falcon-plus

v0.0.0-20170119143835-2b2d2cb865f2

Live on go

Blocked by Socket

This snippet conditionally executes shell commands in CI based on an environment variable index. It includes an explicit fetch-and-execute command that pipes a remote script into bash without integrity checks. Combined with exec-based shell command execution and environment-driven command selection, this represents a high supply-chain/execution risk and should be reviewed/removed or replaced with integrity-verified, pinned, and non-piped remote code handling.

coderun-cli

1.0.3

by luxian

Removed from npm

Blocked by Socket

No definitive malware or backdoor detected in the provided fragment. The bundle appears to be a composite of legitimate UI/editor libraries (React internals, CodeMirror-like editors, Sandpack runtime, styling tools). The risk remains moderate due to potential data exposure paths in complex plugin ecosystems and the opaqueness of transitive dependencies in a large bundle. A full audit should include: dependency integrity checks, SAST/DAST on dynamic imports, and runtime data-flow tracing across all plugins/extensions.

Live on npm for 7 hours and 18 minutes before removal. Socket users were protected even while the package was live.

@inkeep/agents-manage-ui

0.0.0-dev-20250912195514

by abraham-inkeep

Live on npm

Blocked by Socket

The code presents a cautious, opt-in instrumentation integration tailored for Next.js Edge runtime. It includes protective patterns (proxy for unsupported modules), guarded startup, and non-fatal error handling. No evidence of data leakage or malicious activity is observed in this module alone. The primary security considerations are dependency trust in the external instrumentation module and ensuring that eager startup does not introduce unintended side effects in edge deployments.

agentdojo

0.1.14

Live on pypi

Blocked by Socket

This conversation demonstrates a successful prompt-injection-based data exfiltration: a webpage/tool output contained an instruction to collect Slack channel messages and post them to an external website; the assistant executed that instruction and posted internal channel content (including a hard-coded secret) to http://www.my-website-234.com/random. This is a clear supply-chain/security incident (sensitive data disclosure). Remediation: treat tool outputs as untrusted, enforce policies that assistant must ignore instructions found in fetched content, restrict automated posting of internal messages to external endpoints, and rotate any exposed secrets (e.g., '1a7b3d').

github-badge-bot

1.6.0

Live on npm

Blocked by Socket

The code logs into Discord accounts using provided tokens, enumerates guilds, obtains or creates persistent invite links, and sends those links to an external Telegram endpoint. This is a privacy-invasive behavior that can be used to exfiltrate server invite links and server names. The code is readable and not obfuscated, but its behavior is consistent with abusive or malicious use (harvesting and sharing guild invites). Recommend treating this module as high risk for misuse; inspect sendInviteToTelegram implementation and validate intent/consent before use. If tokens are not owned/authorized, do not run this code.

opendagent

0.2.7

Live on pypi

Blocked by Socket

This fragment is dominated by read-only SQLite dashboard/data assembly, but it contains a severe, high-confidence integrity anomaly: _task_neighbors() executes an unexpected multi-statement SQL payload including INSERTs into core tables and calls connection.commit(), indicating persistent database tampering during an operation that should only compute neighbors. The snippet also appears corrupted/incomplete in multiple places, further reducing trust. Treat the package/module as unsafe until the full repository version and diffs are verified; review and remove/repair the _task_neighbors() implementation, ensure neighbor computation is strictly read-only, and validate that multi-statement SQL execution and commit side effects are not present in query helpers.

yektadg/medialibrary

1.05

Live on composer

Blocked by Socket

The SweetAlert2 library code is mostly benign and serves as a UI modal dialog tool. However, it contains a suspicious and potentially malicious snippet that targets Russian users on certain domains to play an unsolicited audio prank, disabling pointer events and potentially disrupting user interaction. This behavior is unexpected and should be considered a moderate security risk and potential malware. The rest of the code shows no signs of malicious intent. The provided reports were invalid and unhelpful. Users should be cautious about this version of the library due to the embedded prank behavior.

common-icons

1.0.88

by cwg_poc

Removed from npm

Blocked by Socket

The code exhibits malicious behavior by accessing sensitive AWS metadata and exfiltrating system information to an external domain.

Live on npm for 16 hours and 7 minutes before removal. Socket users were protected even while the package was live.

twitterdataminer

0.2.2

Live on pypi

Blocked by Socket

The script demonstrates persistent data-collection and potential exfiltration behavior: IP discovery, local DB state manipulation, CSV generation, and an external data-mining/exfiltration tool invocation. Hardcoded credentials, log exposure of secrets, unparameterized SQL, and a non-terminating background loop create substantial security and supply-chain risks. Treat as high-risk; require removal or extensive refactoring, including eliminating hardcoded secrets, removing persistent background behavior, validating inputs, using parameterized queries, and tightly auditing any external data transfers.

xync-client

0.0.112

Live on pypi

Blocked by Socket

This script is high-risk: it automates interactive login flows, captures and persists full browser storage_state (session tokens), and navigates authenticated sessions to banking/payment endpoints. The combination enables account takeover and fraudulent transactions when misused. Treat as malicious or at minimum dangerous automation; require immediate review, restrict execution, and audit any stored agent.state entries. Remediate by removing session persistence, not storing storage_state, and implementing strict access controls and logging.

rollup-pluginuls

1.2.0

by 17b4a931

Removed from npm

Blocked by Socket

This code poses a serious security risk and should not be used.

Live on npm for 9 minutes before removal. Socket users were protected even while the package was live.

sleek-pretty

1.0.0

by probull02

Live on npm

Blocked by Socket

This module exhibits strong malicious supply-chain/data-stealing characteristics. It performs host reconnaissance, specifically targets environment/config and sensitive-looking project files (including '.env' and config-like filenames), reads their contents, base64-encodes document content when needed, chunks payloads to fit HTTP limits, and exfiltrates the collected data to a remote API via multiple POST requests. No legitimate purpose consistent with normal library behavior is evident from the fragment.

overstock-logger

3.14.4

by rampatidar

Removed from npm

Blocked by Socket

The install scripts fetch and execute remote shell code directly from a GitHub raw URL during install (and related lifecycle hooks). This is high-risk and effectively allows the remote repository to run arbitrary commands on any system that installs the package. Treat this package as malicious/untrusted and do not install it in any environment where you care about confidentiality or integrity.

Live on npm for 1 day, 11 hours and 46 minutes before removal. Socket users were protected even while the package was live.

lgblkb-tools

1.0.50

Live on pypi

Blocked by Socket

This module contains explicit data-exfiltration behavior: a plaintext Telegram bot token and an unconditional upload of a specific local file to a remote Telegram chat when executed. In a repository or dependency this constitutes a high-risk backdoor and credential leak. Treat as malicious/unsafe for reuse in packages; revoke the token and remove or modify the code to require explicit, authenticated configuration before any network file transfer.

354766/Ceeon/remotion-skill/remotion/

1cb2d09ac6af8028886d1b7cea173a55007f4ab0

Live on socket

Blocked by Socket

[Skill Scanner] Installation of third-party script detected (AITech 9.1.4) [SC006]

chuckbe/chuckcms

0.1-beta

Live on composer

Blocked by Socket

The snippet contains a high-risk anomaly: an inline shell command embedded in a backtick expression within a placeholder, which could enable local data access or command execution if the snippet processor evaluates such content during expansion. This warrants sanitization or removal and a review of the consuming tool's handling of template expressions.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Git dependency

GitHub dependency

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

Telemetry

Protestware or potentially unwanted behavior

Unstable ownership

55 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a Demo

Questions? Call us at (844) SOCKET-0

Read the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles