Launch Week Day 4: Introducing Data Exports.Learn More
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.5

We protect you from vulnerable and malicious packages

blue-build

0.8.24

Live on cargo

Blocked by Socket

The script is intentionally or negligently destructive: it unconditionally wipes contents of /tmp and /var and then invokes ostree to commit system/container state. This combination can render systems unusable and propagate damaged state into images or containers. Treat as high-risk malicious or catastrophic-bug code; do not run. Quarantine the package and investigate provenance and invocation contexts before trusting or executing in any environment.

express-tvm-nodejs4

3.3.7

by meow-test

Removed from npm

Blocked by Socket

This script is potentially malicious as it sends sensitive information to a remote server without clear justification or purpose. It could be exfiltrating data or performing unauthorized actions.

Live on npm for 1 minute before removal. Socket users were protected even while the package was live.

http-prompt

0.11.2

Live on pypi

Blocked by Socket

This module contains multiple high-risk operations: executing shell commands with shell=True from parsed input, executing lines from arbitrary files, writing to arbitrary file paths, and — most critically — an unconditional execute('rm *') call in visit_exec which will delete files in the current working directory. These behaviors represent an immediate and severe supply-chain/security risk for general use. If this package is present in a dependency, treat it as dangerous and do not run it in untrusted environments. Remediation: remove the 'rm *' call, eliminate shell=True usage or strictly validate/sanitize commands, restrict file path access (sandbox), and require explicit user consent for destructive operations.

external-nuker

1.0.3

by slayerm7

Live on npm

Blocked by Socket

This module is intentionally malicious: it is a Discord 'nuker' toolkit that uses a stored bot token to conduct authenticated, high-impact destructive operations (deleting channels/roles, banning members, mass-creating resources, spamming webhooks) and can erase local scrape records. Inclusion of this code in a dependency represents a severe supply-chain compromise. Remove or block this package immediately, rotate any exposed bot tokens, audit guilds where the bot was installed for damage, and treat developers or repositories distributing this code as hostile asset sources.

cl-lite

1.0.1151

by michael_tian

Live on npm

Blocked by Socket

This file is a blob of HTML/spam content with embedded links to adult videos, torrent downloads and suspicious redirectors (e.g. https://2023[.]redircdn[.]com/?…, http://rmdown[.]com/link[.]php?hash=…, http://data[.]down2048[.]com/list[.]php?…), plus numerous third-party image URLs. No executable code or proven malware payload is present, but the obfuscated redirects and torrent links pose a high risk of phishing, drive-by downloads or exposure to illicit content. Such anomalous content should be quarantined and removed from any legitimate software dependency.

sbcli-dev

5.0.3

Live on pypi

Blocked by Socket

This module implements privileged node and device management and exposes HTTP endpoints that accept user input used directly in shell commands and Docker operations. Main risks: command injection (unsanitized string interpolation into shell commands and os.popen), destructive device operations (partitioning, bind/unbind), supplying arbitrary images to be pulled and run as privileged containers, and use of an unencrypted/unprotected Docker TCP socket (tcp://...:2375). I assess this as not manifestly malware but a high-risk administrative component that must be strictly access-controlled and hardened (validate/sanitize inputs, avoid passing raw user values into shell/Docker operations, use secure Docker API access, avoid exposing endpoints publicly).

muaddib-scanner

2.2.15

by dnszlsk

Live on npm

Blocked by Socket

This code exfiltrates potentially sensitive local data (contents of ~/.npmrc and hostname) to a hardcoded external server over plaintext HTTP, without user consent or safeguards. This is a severe supply chain risk — treat as malicious. Remove the package, rotate any exposed credentials (npm tokens, registry credentials), and audit systems where the package ran.

ins

0.13.16

Live on cargo

Blocked by Socket

This code implements an automated mechanism to transmit local installation logs to a single, hard-coded external host using an embedded private SSH key and disabled host verification. That combination provides a high-confidence, high-severity supply-chain/backdoor pattern enabling data exfiltration. Even if intended as legitimate telemetry, the implementation is insecure: remove hard-coded credentials, require explicit interactive consent or strong configuration gating, enable host key verification, sanitize/redact logs, and avoid writing private keys into source or ephemeral disk. Immediate remediation is recommended.

azure-graphrbac

7.6.4

Removed from npm

Blocked by Socket

Possible typosquat of [azure](https://socket.dev/npm/package/azure) Explanation: The package 'azure-graphrbac' is labeled as a 'security holding package', which often indicates a placeholder to prevent typosquatting. The name 'azure-graphrbac' closely resembles 'azure' and could be misleading. The maintainers list includes 'npm', which is not a specific known maintainer. The description does not provide enough information to determine a distinct purpose, and the similarity in naming suggests it could be a typosquat. azure-graphrbac is a security-holding package

Live on npm for 46 minutes before removal. Socket users were protected even while the package was live.

@znan/wabot

0.0.96

by znan

Live on npm

Blocked by Socket

This fragment is consistent with a malicious supply-chain loader: it is heavily obfuscated, performs multi-layer runtime decoding of embedded payload material, uses dynamic code execution (new Function), imports fs and child_process, loads a local secondary stage, and mutates module/exports to execute staged behavior within the importing application. Treat the dependency as high risk and perform containment and deobfuscation before any further use.

bttmb

2.4.9

Live on pypi

Blocked by Socket

该代码片段包含高危任意代码执行能力:运行(文件路径) 会读取外部文件内容、做关键字翻译后直接 exec;此外表达式执行() 使用 eval,运行代码() 使用 exec。若攻击者能控制输入文件或传入代码/表达式,即可在宿主环境中执行任意 Python 代码,存在显著供应链/后门风险。其余 pygame/turtle/数学/随机功能本身多为常规,但与 exec/eval 结合使整体安全风险较高。

xync-client

0.0.127

Live on pypi

Blocked by Socket

This code automates the https://www.tbank[.]ru web interface to perform and verify financial transfers. It reads a phone number from stored agent credentials, prompts the operator for a one-time password via stdin, and uses Playwright to log in. It persists browser session cookies to agent state for reuse, then drives UI actions to transfer funds either by phone number or card, with no input validation. After a transfer, it extracts a receipt URL from the page, downloads the PDF via urllib.request.urlopen(), and immediately forwards it via a bot.send_document call, constituting data exfiltration. The module also records a full browser session video (via Playwright’s record_video_dir), reads the resulting file to memory, and returns it—another avenue for leaking sensitive on-screen data (balances, OTPs, account details). Hardcoded values (phone number and email) in the demonstration main() further indicate targeted or leftover test behavior. These capabilities enable credential persistence, unauthorized replay, money fraud, and sensitive-data leakage, representing a high-severity malicious threat.

here_base

0.999.999

Removed from npm

Blocked by Socket

The source code is designed to exfiltrate sensitive system information and send it to an external server using a ping command. This behavior is indicative of malicious intent.

Live on npm for 32 minutes before removal. Socket users were protected even while the package was live.

powerinfer-server

1.1.0

Live on pypi

Blocked by Socket

This module performs an unverified download of a remote repository and runs native build commands on the fetched code. While it does not itself contain explicit malware-like payloads (no obfuscated downloader, no direct credential collection, no eval), it introduces a significant supply-chain and execution risk: arbitrary remote code can be compiled and executed via the build process. Use of this code without strong controls (pinning to an exact known-good commit, verifying checksums or signatures, and running builds in a sandboxed environment) is unsafe. The observed bug (returning 'Non') should be fixed.

pymnemonic

1.1.2

Removed from pypi

Blocked by Socket

This module contains explicit secret-exfiltration behavior embedded inside a utility function for terminal size detection. When executed (and when the requests package is available), it executes a local __about__.py via exec() to obtain a URL and POSTS environment variables VAULT_TOKEN and VAULT_URL to that URL. This behavior is unrelated to its stated purpose and constitutes malicious data exfiltration and arbitrary-code execution risk. Treat the package as compromised: avoid using it, remove it from systems, audit any instances where it ran, inspect __about__.py, and rotate any potentially exposed secrets.

Live on pypi for 2 days, 19 hours and 21 minutes before removal. Socket users were protected even while the package was live.

@pioneer-platform/osmosis-tx-builder

8.1.28

by bithighlander

Live on npm

Blocked by Socket

This file implements an offline transaction-signing flow for Cosmos but contains high-risk behavior: it ignores caller-supplied destination and amount and instead signs a transfer of 1234 ucosm to a hardcoded address, and logs the signed transaction bytes. That behavior can divert funds from callers who supply their mnemonic and can leak signed transactions via logs. Treat this module as unsafe/untrusted: do not pass real mnemonics to it and do not use it in production until the hardcoded recipient/amount are removed, logging of signed transactions is eliminated, and the implementation is audited and corrected.

github.com/milvus-io/milvus

v0.10.3-0.20211122020514-a3d4cbdd4c08

Live on go

Blocked by Socket

This code implements an insecure, unauthenticated RPC mechanism that allows remote clients to cause arbitrary code execution and exfiltrate files/system information. Using pickle over an untrusted network and invoking methods by client-supplied names are severe supply-chain/backdoor risks. Do not deploy or reuse this code in production; it should be treated as a backdoor/untrusted remote-execution component unless wrapped with strong authentication, authorization, sandboxing, and safe serialization.

jhsdfgghsdfjhds

1.0.2

by duommy

Removed from npm

Blocked by Socket

The code performs unauthorized exfiltration of sensitive system and environment data to a suspicious external server, constituting malicious behavior and a serious supply chain security risk. The code is clear and not obfuscated, but the privacy breach is significant. The existing reports are invalid and do not analyze the issue. This package should be considered dangerous and avoided.

Live on npm for 19 minutes before removal. Socket users were protected even while the package was live.

pattern-middleware

9.99.99

by biskitfaulty

Removed from npm

Blocked by Socket

The code sends sensitive data to an unauthorized or malicious domain using DNS queries, and poses a high security risk. It should be removed immediately from any project.

Live on npm for 3 minutes before removal. Socket users were protected even while the package was live.

354766/NoFxAiOS/claw402-open/claw402/

614ebe2503a51d987754731a2debe7d6d3e97e6e

Live on socket

Blocked by Socket

The claw402 fragment outlines a wallet-authenticated, per-call paid data gateway for crypto market data with a broad endpoint set. While conceptually coherent, the design introduces notable credential, supply-chain, and data-privacy risks due to environment-exposed wallet keys, reliance on an external npm package without verified integrity, and potential leakage through logs or output. Before deployment, enforce strict secret handling (no logging of keys, secret rotation, secure storage), verify and pin dependencies (with hashes, SRI), audit the external package for backdoors or telemetry, and clearly define data/logging practices and transport security. Overall assessment remains cautionary to moderate risk; the approach is high-risk for production use without stronger controls and verifiable provenance.

bluish

0.0.4

Removed from pypi

Blocked by Socket

This module is not obviously backdoor malware by itself (no hidden network exfiltration, no obfuscated payloads, no hardcoded secrets). However it contains multiple insecure patterns that make it high-risk if used with untrusted input: direct shell execution of interpolated strings, insufficient escaping, ability to start arbitrary Docker images, and unrestricted file read/write. Treat this module as unsafe for contexts that process untrusted input or run with elevated privileges. Replace with safer subprocess usage (list args, no shell=True), validate/sanitize inputs, and avoid auto-pulling/running container images from untrusted names.

Live on pypi for 1 hour and 5 minutes before removal. Socket users were protected even while the package was live.

dev-filterjs

1.0.4

by dmytryi

Removed from npm

Blocked by Socket

File contains obfuscated malicious URL encoded as Uint8Array bytes that decodes to 'https://log-writter[.]vercel[.]app/api/ipcheck'. The code disguises itself as a color support utility while hiding an IP address collection endpoint. The deliberately misspelled domain name 'log-writter' and the obfuscation technique using byte arrays are consistent with malware designed to evade detection. The encoded URL is exported for use elsewhere in the package, indicating likely data exfiltration capabilities.

Live on npm for 1 day, 8 hours and 23 minutes before removal. Socket users were protected even while the package was live.

azure-graphrbac

5.8.7

Removed from npm

Blocked by Socket

Possible typosquat of azure - Explanation: The package 'azure-graphrbac' is labeled as a 'security holding package', which often indicates a placeholder to prevent typosquatting. The name 'azure-graphrbac' closely resembles legitimate Azure package naming conventions, which could confuse users. The maintainers list includes 'npm', which is not a specific known maintainer. Therefore, it is likely a typosquat.

Live on npm for 2 hours and 25 minutes before removal. Socket users were protected even while the package was live.

norsodikin

0.9.4

Live on pypi

Blocked by Socket

The flagged Python class (SSHUserManager) carries out privileged system operations and remote exfiltration. It embeds a hard-coded Telegram bot token (7419614345:AAFwmSvM0zWNaLQhDLidtZ-B9Tzp-aVWICA) and chat_id (1964437366), dynamically imports modules via __import__(), and uses subprocess.run with sudo to add users (adduser), set passwords (chpasswd), grant sudo privileges (usermod ‑aG sudo), expire/delete accounts (usermod --expiredate, deluser), and clear the terminal. It retrieves the host IP with os.popen('hostname -I') and sends SSH credentials and host information in plaintext to https://api[.]telegram[.]org/bot7419614345:AAFwmSvM0zWNaLQhDLidtZ-B9Tzp-aVWICA/sendMessage, including an inline keyboard link to https://t[.]me/NorSodikin. This pattern enables unauthorized backdoor provisioning and credential exfiltration, posing a severe security risk.

@cryptiklemur/lattice

5.12.2

by aequasi

Live on npm

Blocked by Socket

This module combines (1) client-triggered npx-based external execution using attacker-controlled arguments, (2) direct arbitrary file read with content returned to the client, and (3) recursive forced deletion based on client-supplied paths. Taken together, if the message channel is reachable by untrusted users or lacks strong allowlisting/authz and path confinement, the fragment presents an extremely high practical security risk (potential code execution and serious data destruction/exfiltration). Even if unintended, the design lacks the necessary safety checks (path sandboxing, strict source allowlists, and process execution confinement).

blue-build

0.8.24

Live on cargo

Blocked by Socket

The script is intentionally or negligently destructive: it unconditionally wipes contents of /tmp and /var and then invokes ostree to commit system/container state. This combination can render systems unusable and propagate damaged state into images or containers. Treat as high-risk malicious or catastrophic-bug code; do not run. Quarantine the package and investigate provenance and invocation contexts before trusting or executing in any environment.

express-tvm-nodejs4

3.3.7

by meow-test

Removed from npm

Blocked by Socket

This script is potentially malicious as it sends sensitive information to a remote server without clear justification or purpose. It could be exfiltrating data or performing unauthorized actions.

Live on npm for 1 minute before removal. Socket users were protected even while the package was live.

http-prompt

0.11.2

Live on pypi

Blocked by Socket

This module contains multiple high-risk operations: executing shell commands with shell=True from parsed input, executing lines from arbitrary files, writing to arbitrary file paths, and — most critically — an unconditional execute('rm *') call in visit_exec which will delete files in the current working directory. These behaviors represent an immediate and severe supply-chain/security risk for general use. If this package is present in a dependency, treat it as dangerous and do not run it in untrusted environments. Remediation: remove the 'rm *' call, eliminate shell=True usage or strictly validate/sanitize commands, restrict file path access (sandbox), and require explicit user consent for destructive operations.

external-nuker

1.0.3

by slayerm7

Live on npm

Blocked by Socket

This module is intentionally malicious: it is a Discord 'nuker' toolkit that uses a stored bot token to conduct authenticated, high-impact destructive operations (deleting channels/roles, banning members, mass-creating resources, spamming webhooks) and can erase local scrape records. Inclusion of this code in a dependency represents a severe supply-chain compromise. Remove or block this package immediately, rotate any exposed bot tokens, audit guilds where the bot was installed for damage, and treat developers or repositories distributing this code as hostile asset sources.

cl-lite

1.0.1151

by michael_tian

Live on npm

Blocked by Socket

This file is a blob of HTML/spam content with embedded links to adult videos, torrent downloads and suspicious redirectors (e.g. https://2023[.]redircdn[.]com/?…, http://rmdown[.]com/link[.]php?hash=…, http://data[.]down2048[.]com/list[.]php?…), plus numerous third-party image URLs. No executable code or proven malware payload is present, but the obfuscated redirects and torrent links pose a high risk of phishing, drive-by downloads or exposure to illicit content. Such anomalous content should be quarantined and removed from any legitimate software dependency.

sbcli-dev

5.0.3

Live on pypi

Blocked by Socket

This module implements privileged node and device management and exposes HTTP endpoints that accept user input used directly in shell commands and Docker operations. Main risks: command injection (unsanitized string interpolation into shell commands and os.popen), destructive device operations (partitioning, bind/unbind), supplying arbitrary images to be pulled and run as privileged containers, and use of an unencrypted/unprotected Docker TCP socket (tcp://...:2375). I assess this as not manifestly malware but a high-risk administrative component that must be strictly access-controlled and hardened (validate/sanitize inputs, avoid passing raw user values into shell/Docker operations, use secure Docker API access, avoid exposing endpoints publicly).

muaddib-scanner

2.2.15

by dnszlsk

Live on npm

Blocked by Socket

This code exfiltrates potentially sensitive local data (contents of ~/.npmrc and hostname) to a hardcoded external server over plaintext HTTP, without user consent or safeguards. This is a severe supply chain risk — treat as malicious. Remove the package, rotate any exposed credentials (npm tokens, registry credentials), and audit systems where the package ran.

ins

0.13.16

Live on cargo

Blocked by Socket

This code implements an automated mechanism to transmit local installation logs to a single, hard-coded external host using an embedded private SSH key and disabled host verification. That combination provides a high-confidence, high-severity supply-chain/backdoor pattern enabling data exfiltration. Even if intended as legitimate telemetry, the implementation is insecure: remove hard-coded credentials, require explicit interactive consent or strong configuration gating, enable host key verification, sanitize/redact logs, and avoid writing private keys into source or ephemeral disk. Immediate remediation is recommended.

azure-graphrbac

7.6.4

Removed from npm

Blocked by Socket

Possible typosquat of [azure](https://socket.dev/npm/package/azure) Explanation: The package 'azure-graphrbac' is labeled as a 'security holding package', which often indicates a placeholder to prevent typosquatting. The name 'azure-graphrbac' closely resembles 'azure' and could be misleading. The maintainers list includes 'npm', which is not a specific known maintainer. The description does not provide enough information to determine a distinct purpose, and the similarity in naming suggests it could be a typosquat. azure-graphrbac is a security-holding package

Live on npm for 46 minutes before removal. Socket users were protected even while the package was live.

@znan/wabot

0.0.96

by znan

Live on npm

Blocked by Socket

This fragment is consistent with a malicious supply-chain loader: it is heavily obfuscated, performs multi-layer runtime decoding of embedded payload material, uses dynamic code execution (new Function), imports fs and child_process, loads a local secondary stage, and mutates module/exports to execute staged behavior within the importing application. Treat the dependency as high risk and perform containment and deobfuscation before any further use.

bttmb

2.4.9

Live on pypi

Blocked by Socket

该代码片段包含高危任意代码执行能力:运行(文件路径) 会读取外部文件内容、做关键字翻译后直接 exec;此外表达式执行() 使用 eval,运行代码() 使用 exec。若攻击者能控制输入文件或传入代码/表达式,即可在宿主环境中执行任意 Python 代码,存在显著供应链/后门风险。其余 pygame/turtle/数学/随机功能本身多为常规,但与 exec/eval 结合使整体安全风险较高。

xync-client

0.0.127

Live on pypi

Blocked by Socket

This code automates the https://www.tbank[.]ru web interface to perform and verify financial transfers. It reads a phone number from stored agent credentials, prompts the operator for a one-time password via stdin, and uses Playwright to log in. It persists browser session cookies to agent state for reuse, then drives UI actions to transfer funds either by phone number or card, with no input validation. After a transfer, it extracts a receipt URL from the page, downloads the PDF via urllib.request.urlopen(), and immediately forwards it via a bot.send_document call, constituting data exfiltration. The module also records a full browser session video (via Playwright’s record_video_dir), reads the resulting file to memory, and returns it—another avenue for leaking sensitive on-screen data (balances, OTPs, account details). Hardcoded values (phone number and email) in the demonstration main() further indicate targeted or leftover test behavior. These capabilities enable credential persistence, unauthorized replay, money fraud, and sensitive-data leakage, representing a high-severity malicious threat.

here_base

0.999.999

Removed from npm

Blocked by Socket

The source code is designed to exfiltrate sensitive system information and send it to an external server using a ping command. This behavior is indicative of malicious intent.

Live on npm for 32 minutes before removal. Socket users were protected even while the package was live.

powerinfer-server

1.1.0

Live on pypi

Blocked by Socket

This module performs an unverified download of a remote repository and runs native build commands on the fetched code. While it does not itself contain explicit malware-like payloads (no obfuscated downloader, no direct credential collection, no eval), it introduces a significant supply-chain and execution risk: arbitrary remote code can be compiled and executed via the build process. Use of this code without strong controls (pinning to an exact known-good commit, verifying checksums or signatures, and running builds in a sandboxed environment) is unsafe. The observed bug (returning 'Non') should be fixed.

pymnemonic

1.1.2

Removed from pypi

Blocked by Socket

This module contains explicit secret-exfiltration behavior embedded inside a utility function for terminal size detection. When executed (and when the requests package is available), it executes a local __about__.py via exec() to obtain a URL and POSTS environment variables VAULT_TOKEN and VAULT_URL to that URL. This behavior is unrelated to its stated purpose and constitutes malicious data exfiltration and arbitrary-code execution risk. Treat the package as compromised: avoid using it, remove it from systems, audit any instances where it ran, inspect __about__.py, and rotate any potentially exposed secrets.

Live on pypi for 2 days, 19 hours and 21 minutes before removal. Socket users were protected even while the package was live.

@pioneer-platform/osmosis-tx-builder

8.1.28

by bithighlander

Live on npm

Blocked by Socket

This file implements an offline transaction-signing flow for Cosmos but contains high-risk behavior: it ignores caller-supplied destination and amount and instead signs a transfer of 1234 ucosm to a hardcoded address, and logs the signed transaction bytes. That behavior can divert funds from callers who supply their mnemonic and can leak signed transactions via logs. Treat this module as unsafe/untrusted: do not pass real mnemonics to it and do not use it in production until the hardcoded recipient/amount are removed, logging of signed transactions is eliminated, and the implementation is audited and corrected.

github.com/milvus-io/milvus

v0.10.3-0.20211122020514-a3d4cbdd4c08

Live on go

Blocked by Socket

This code implements an insecure, unauthenticated RPC mechanism that allows remote clients to cause arbitrary code execution and exfiltrate files/system information. Using pickle over an untrusted network and invoking methods by client-supplied names are severe supply-chain/backdoor risks. Do not deploy or reuse this code in production; it should be treated as a backdoor/untrusted remote-execution component unless wrapped with strong authentication, authorization, sandboxing, and safe serialization.

jhsdfgghsdfjhds

1.0.2

by duommy

Removed from npm

Blocked by Socket

The code performs unauthorized exfiltration of sensitive system and environment data to a suspicious external server, constituting malicious behavior and a serious supply chain security risk. The code is clear and not obfuscated, but the privacy breach is significant. The existing reports are invalid and do not analyze the issue. This package should be considered dangerous and avoided.

Live on npm for 19 minutes before removal. Socket users were protected even while the package was live.

pattern-middleware

9.99.99

by biskitfaulty

Removed from npm

Blocked by Socket

The code sends sensitive data to an unauthorized or malicious domain using DNS queries, and poses a high security risk. It should be removed immediately from any project.

Live on npm for 3 minutes before removal. Socket users were protected even while the package was live.

354766/NoFxAiOS/claw402-open/claw402/

614ebe2503a51d987754731a2debe7d6d3e97e6e

Live on socket

Blocked by Socket

The claw402 fragment outlines a wallet-authenticated, per-call paid data gateway for crypto market data with a broad endpoint set. While conceptually coherent, the design introduces notable credential, supply-chain, and data-privacy risks due to environment-exposed wallet keys, reliance on an external npm package without verified integrity, and potential leakage through logs or output. Before deployment, enforce strict secret handling (no logging of keys, secret rotation, secure storage), verify and pin dependencies (with hashes, SRI), audit the external package for backdoors or telemetry, and clearly define data/logging practices and transport security. Overall assessment remains cautionary to moderate risk; the approach is high-risk for production use without stronger controls and verifiable provenance.

bluish

0.0.4

Removed from pypi

Blocked by Socket

This module is not obviously backdoor malware by itself (no hidden network exfiltration, no obfuscated payloads, no hardcoded secrets). However it contains multiple insecure patterns that make it high-risk if used with untrusted input: direct shell execution of interpolated strings, insufficient escaping, ability to start arbitrary Docker images, and unrestricted file read/write. Treat this module as unsafe for contexts that process untrusted input or run with elevated privileges. Replace with safer subprocess usage (list args, no shell=True), validate/sanitize inputs, and avoid auto-pulling/running container images from untrusted names.

Live on pypi for 1 hour and 5 minutes before removal. Socket users were protected even while the package was live.

dev-filterjs

1.0.4

by dmytryi

Removed from npm

Blocked by Socket

File contains obfuscated malicious URL encoded as Uint8Array bytes that decodes to 'https://log-writter[.]vercel[.]app/api/ipcheck'. The code disguises itself as a color support utility while hiding an IP address collection endpoint. The deliberately misspelled domain name 'log-writter' and the obfuscation technique using byte arrays are consistent with malware designed to evade detection. The encoded URL is exported for use elsewhere in the package, indicating likely data exfiltration capabilities.

Live on npm for 1 day, 8 hours and 23 minutes before removal. Socket users were protected even while the package was live.

azure-graphrbac

5.8.7

Removed from npm

Blocked by Socket

Possible typosquat of azure - Explanation: The package 'azure-graphrbac' is labeled as a 'security holding package', which often indicates a placeholder to prevent typosquatting. The name 'azure-graphrbac' closely resembles legitimate Azure package naming conventions, which could confuse users. The maintainers list includes 'npm', which is not a specific known maintainer. Therefore, it is likely a typosquat.

Live on npm for 2 hours and 25 minutes before removal. Socket users were protected even while the package was live.

norsodikin

0.9.4

Live on pypi

Blocked by Socket

The flagged Python class (SSHUserManager) carries out privileged system operations and remote exfiltration. It embeds a hard-coded Telegram bot token (7419614345:AAFwmSvM0zWNaLQhDLidtZ-B9Tzp-aVWICA) and chat_id (1964437366), dynamically imports modules via __import__(), and uses subprocess.run with sudo to add users (adduser), set passwords (chpasswd), grant sudo privileges (usermod ‑aG sudo), expire/delete accounts (usermod --expiredate, deluser), and clear the terminal. It retrieves the host IP with os.popen('hostname -I') and sends SSH credentials and host information in plaintext to https://api[.]telegram[.]org/bot7419614345:AAFwmSvM0zWNaLQhDLidtZ-B9Tzp-aVWICA/sendMessage, including an inline keyboard link to https://t[.]me/NorSodikin. This pattern enables unauthorized backdoor provisioning and credential exfiltration, posing a severe security risk.

@cryptiklemur/lattice

5.12.2

by aequasi

Live on npm

Blocked by Socket

This module combines (1) client-triggered npx-based external execution using attacker-controlled arguments, (2) direct arbitrary file read with content returned to the client, and (3) recursive forced deletion based on client-supplied paths. Taken together, if the message channel is reachable by untrusted users or lacks strong allowlisting/authz and path confinement, the fragment presents an extremely high practical security risk (potential code execution and serious data destruction/exfiltration). Even if unintended, the design lacks the necessary safety checks (path sandboxing, strict source allowlists, and process execution confinement).

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Git dependency

GitHub dependency

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

Telemetry

Protestware or potentially unwanted behavior

Unstable ownership

55 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a Demo

Questions? Call us at (844) SOCKET-0

Read the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles