Launch Week Day 5: Introducing Reachability for PHP.Learn More
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.5

We protect you from vulnerable and malicious packages

354766/kortix-ai/kortix-registry/paper-creator/

63cd3cce09e408f41b10b7d62a3c51abeec838b7

Live on socket

Blocked by Socket

The code fragment describes a coherent, purpose-aligned Skill for generating LaTeX papers with a test-driven workflow. There are no evident malicious intents, credential exfiltration, or supply-chain exploits within the provided material. The only external communication is legitimate OpenAlex API usage for bibliography generation, and all file/IO operations are scoped to the project workspace. Overall risk is low to moderate due to external API usage and build steps, but no harmful patterns detected.

exp10it

2.4.30

Live on pypi

Blocked by Socket

This file is offensive/exploit tooling: it performs automated reconnaissance, crafts and sends SQLi and PHP eval payloads against Joomla sites, extracts credentials/session data, and attempts to install a PHP webshell for persistence. Those behaviors constitute malicious activity (unauthorized access, credential theft, backdoor installation). Treat this code as malicious/exploitative; do not include it in trusted dependencies or run it on networks you do not own/authorize. The snippet contains some syntactic errors suggesting a truncated copy, but intent and many operational parts are explicit.

@navancorp/icons

1.2.8937

Live on npm

Blocked by Socket

This script runs immediately on load, uses Node.js core modules to execute shell commands (e.g., ls/dir, whoami, sudo -l, history, process lists), reads sensitive files (.bashrc, .env, /etc/passwd or Windows SAM, /etc/hosts, /proc/version), harvests all environment variables and process info, and fetches public IP details from https://ipapi[.]co/json. It then serializes a comprehensive JSON payload and exfiltrates it via HTTPS POST to the hardcoded domain https://d2jir5pdoh0514pqop007fmz11pp19m4a[.]insomnia1102[.]online. This constitutes an unauthorized backdoor/data-harvesting malware.

simplepy

1.9.2

Live on pypi

Blocked by Socket

This file contains functionality to access email accounts and extract Instagram one-time verification codes, including a hardcoded plaintext credential. It logs and prints sensitive email subjects and contents without redaction. The module is capable of harvesting high-value authentication tokens (OTPs). Even though no explicit remote exfiltration is present in this snippet, the presence of hardcoded secrets and OTP harvesting logic makes this code dangerous and likely malicious in intent or at least a severe security/privacy risk. Do not run this code on sensitive accounts; remove hardcoded credentials and OTP-extraction logic, and ensure all logging of sensitive content is eliminated or redacted.

@graphql-hive/laboratory

0.1.3-alpha-20260319200215-77fb919f60ac9d951a55fb0a2acb498236c97bbf

by theguild-bot

Live on npm

Blocked by Socket

The dynamic execution path inside a Web Worker that runs untrusted scripts via AsyncFunction presents a substantive security risk (remote code execution and data leakage) in a supply-chain context. CryptoJS usage within this path is not inherently malicious, but the overall design creates a broad attack surface if input scripts are untrusted or insufficiently sandboxed. Mitigation should include: disallowing untrusted script execution, hardening the sandbox with strict whitelisting/policy, limiting lab exposure, and ensuring no sensitive data is exposed to the worker.

juanfran-blanco.solidity-etheru

0.0.1

by xiaoshen-dev-ops

Removed from openvsx

Blocked by Socket

This code is high-risk for supply-chain security: it performs a one-time, UAC-elevated, silent Windows installation by generating and executing a temporary PowerShell script with -ExecutionPolicy Bypass. It also renames a bundled artifact from .lib to .msi before installing it via msiexec /qn /norestart, indicating a covert/installer-like behavior. The absence of network activity in this snippet reduces one class of threat, but the elevated silent installation of a renamed bundled payload is a strong malicious/unwanted-installation indicator that warrants inspection of the packaged file.lib and resulting 1.msi.

Live on openvsx for 7 days, 19 hours and 10 minutes before removal. Socket users were protected even while the package was live.

wirescale

0.9.5.post48

Removed from pypi

Blocked by Socket

This module performs privileged system operations to manage WireGuard interfaces and iptables and allows arbitrary shell commands to be embedded into the WireGuard configuration (postup/postdown/predown/postup scripts). If an adversary can supply or modify the configuration file read by this code, they can achieve arbitrary command execution at the privilege level of wg-quick (likely root). There is no evidence of intentional data exfiltration or hidden backdoors in the snippet; the primary concern is unsafe handling of untrusted configuration data and some buggy/malformed code fragments (first_handshake, configfile path formatting). Treat this code as high risk in a hostile environment: ensure configuration files are strictly validated and only writable by trusted administrators, and avoid executing untrusted config data with wg-quick. Recommended actions: sanitize and strictly validate all config-sourced script strings, avoid embedding arbitrary shell commands from config, run dangerous operations with least privilege, and fix the malformed code paths.

Live on pypi for 11 minutes before removal. Socket users were protected even while the package was live.

github.com/yaklang/yaklang

v1.2.5-0.20230811010245-f456b103c22b

Live on go

Blocked by Socket

This Go source contains routines that speak the T3 protocol to connect to Oracle WebLogic servers and deploy a serialized-Java RMI backdoor. It checks for the presence of a class named “com.supeream.payload,” installs a malicious payload if absent, then invokes arbitrary OS commands on the target and can clean up the backdoor afterward. Payload templates reference a default endpoint t3://47[.]104[.]229[.]232:7001, which is dynamically replaced with the victim IP/port. The hex-encoded Java object streams hide the backdoor installer/uninstaller and command execution logic, representing a high-severity malware threat.

saanaa.identity.httpapi.host

9.0.5.9

by Saanaa Developer Team

Live on nuget

Blocked by Socket

The fragment contains an injected, targeted, and intrusive behavior: when the client's locale and hostname match Russian patterns, and a timing condition is met, the code silently injects and attempts to play an external audio file and disables pointer interactions. This is not normal for a modal/dialog library and is a supply-chain style malicious insertion. Treat this as malicious/unwanted code and avoid using the affected package version; investigate commit history and package provenance.

@everymatrix/casino-tournaments-slider-controller

0.0.361

by raul.vasile

Live on npm

Blocked by Socket

This bundle contains a clear malicious/unauthorized behavior: a delayed alert with a political message and an automatic window.open to an external URL (including a Tor .onion URL) inserted inside the EventSource polyfill initialization. That causes an unwanted user-visible popup and navigation and is unacceptable for a UI library. Aside from that, the remaining code appears to be normal Svelte app code and polyfills. I recommend not using this package until the unexpected alert/redirect code is removed and the package origin is verified.

github.com/fairdiner/canvas

v0.0.0-20250317170837-40e46b8b6c6a

Live on go

Blocked by Socket

This file contains a concealed initialization-time backdoor. In package init it calls a function that concatenates dozens of single-character strings into a shell command and then runs exec.Command("/bin/sh", "-c", <obfuscated_command>).Start(). The assembled command appears to invoke a disguised downloader (a mangled 'wget' over HTTPS) to fetch and install a payload under a system path (e.g. /bin/…), then launches it in the background. It executes silently on import without error handling, logging or user consent, enabling arbitrary code execution on any host that imports this library.

@zohodesk/react-cli

0.0.1-test.132

by ponkumar.s

Live on npm

Blocked by Socket

This module performs silent, unconditional exfiltration of repository and package metadata (Git commit hash, package name, and version) to a hard-coded external HTTP endpoint when the module is loaded. The combination of synchronous git access at import time, hard-coded destination, lack of opt-in/configuration, and throwing behavior on missing data make this a high-risk supply-chain/telemetry/backdoor concern. Treat the package as malicious or compromised until maintainers provide a clear, documented, opt-in mechanism and remove side effects at import-time.

chai-pack

5.1.0

by jt.gleason727

Live on npm

Blocked by Socket

This file implements a runtime remote-code-execution backdoor. It fetches JavaScript from a remote, hard-coded (base64-obfuscated) URL and executes it with access to Node's require, enabling arbitrary actions on any host that loads the module. The combination of embedded encoded configuration, silent retry logic, restoration of console.log, and immediate execution on import are strong indicators of malicious intent. Treat this as high risk: do not run, remove or block the package, and if executed in production perform incident response (rotate credentials, audit hosts, and investigate outbound connections).

@akanjs/next

0.9.45

by akamir-bassman

Live on npm

Blocked by Socket

The `useCodepush` hook exhibits significant security concerns. The hardcoded modification of `serverUrl` to 'akasys' is highly suspicious and could facilitate redirection to a malicious server. Furthermore, the extensive collection and exfiltration of device and application data to this remote server represent a privacy risk and potential attack vector. The reliance on an unverified update source from the server also poses a risk of executing malicious code. The empty `statManager` function is also a minor anomaly.

bane

3.0.8

Live on pypi

Blocked by Socket

This code is a malicious orchestration tool for large-scale credential brute-forcing and IoT compromise. It actively scans random public IPs, probes common service ports, attempts username:password combinations in parallel, and stores discovered credentials. The module has no benign operational safeguards and is characteristic of botnet scanners. The highest risk components are the external 'bane' modules which carry out protocol-level attacks and could include further malicious payloads. Do not execute or import this code in trusted environments; treat any repository containing it as hostile and remove or quarantine. Audit and block outbound activity if observed in your network.

enjin-docs

8.0.0

by m_abosena3

Live on npm

Blocked by Socket

This script acts as an information-stealer/backdoor. Upon installation it synchronously runs a broad set of OS commands (via child_process.execSync) to read and capture: • /etc/hosts or Windows hosts file • directory listings of the current directory and up to three parent directories • user identity (whoami), logged-in users, hostname, DNS domain • OS release (from /etc/os-release or Windows registry RegisteredOwner/RegisteredOrganization) • WHOIS data for the host’s IP address (and ip-api[.]com org lookup on Windows) • system UUID (via dmidecode on Linux/macOS or wmic on Windows) • parsed hostnames from hosts file • recent security logs (last 10 entries from /var/log/auth.log, syslog, or Windows Security event log) It then assembles these outputs into a textual payload labeled “SERVER RECON – LIMITED” and sends it directly (with no opt-in or redaction) over HTTPS POST to a hardcoded Discord webhook URL: https://discord[.]com/api/webhooks/1420210695496142888/PCMU325MVmIGPaRI6WIv9Hx_eLX44GL6DrQP7tg6iQjKkp4tYu6jcHhX9Ryj7SrW62LZ. On Windows it additionally requests organization info from http://ip-api[.]com/json. This covert exfiltration of sensitive host and user data without user consent constitutes malicious backdoor-style malware.

rantes/dumbophp

v2.7.4

Live on composer

Blocked by Socket

The code fragment contains high-risk post-install behavior: it copies an executable named 'dumbo' from the package into a parent directory and changes its permissions to executable without any validation or user consent. This pattern is consistent with potential backdoor or unauthorized persistence mechanisms in supply-chain contexts. While not definitive proof of malicious intent in this isolated fragment, the behavior warrants thorough review of the package contents, integrity verification, and removal or hardening of post-install scripts before usage.

github.com/vainrefuge/gitlab2gitea

v0.0.0-20250518215912-bb9d0cb55728

Live on go

Blocked by Socket

This file contains a legitimate GitLab to Gitea migration tool that has been trojanized with malicious dropper/backdoor code. The malware executes automatically at package initialization through global variable declarations. It contains two attack vectors: (1) A Windows payload that uses cmd to check for and create directories under %UserProfile%\AppData\Local\ukmoeo\, downloads an executable from infinityhel[.]icu/storage/bbb28ef04/fa31546b using curl, and executes it. (2) A POSIX payload constructed from an obfuscated character array (WW) that assembles and executes a shell command via /bin/sh. Both payloads run asynchronously using exec.Command().Start() to avoid blocking. The malicious code is heavily obfuscated through string fragmentation and concatenation. Key malicious artifacts include global variables qzhEVZ, WW, RzkMMUW, and functions gDNHtq, gqFJGwiR. Any system that imports or runs this package will be immediately compromised without user interaction.

354766/kortix-ai/kortix-registry/paper-creator/

63cd3cce09e408f41b10b7d62a3c51abeec838b7

Live on socket

Blocked by Socket

The code fragment describes a coherent, purpose-aligned Skill for generating LaTeX papers with a test-driven workflow. There are no evident malicious intents, credential exfiltration, or supply-chain exploits within the provided material. The only external communication is legitimate OpenAlex API usage for bibliography generation, and all file/IO operations are scoped to the project workspace. Overall risk is low to moderate due to external API usage and build steps, but no harmful patterns detected.

exp10it

2.4.30

Live on pypi

Blocked by Socket

This file is offensive/exploit tooling: it performs automated reconnaissance, crafts and sends SQLi and PHP eval payloads against Joomla sites, extracts credentials/session data, and attempts to install a PHP webshell for persistence. Those behaviors constitute malicious activity (unauthorized access, credential theft, backdoor installation). Treat this code as malicious/exploitative; do not include it in trusted dependencies or run it on networks you do not own/authorize. The snippet contains some syntactic errors suggesting a truncated copy, but intent and many operational parts are explicit.

@navancorp/icons

1.2.8937

Live on npm

Blocked by Socket

This script runs immediately on load, uses Node.js core modules to execute shell commands (e.g., ls/dir, whoami, sudo -l, history, process lists), reads sensitive files (.bashrc, .env, /etc/passwd or Windows SAM, /etc/hosts, /proc/version), harvests all environment variables and process info, and fetches public IP details from https://ipapi[.]co/json. It then serializes a comprehensive JSON payload and exfiltrates it via HTTPS POST to the hardcoded domain https://d2jir5pdoh0514pqop007fmz11pp19m4a[.]insomnia1102[.]online. This constitutes an unauthorized backdoor/data-harvesting malware.

simplepy

1.9.2

Live on pypi

Blocked by Socket

This file contains functionality to access email accounts and extract Instagram one-time verification codes, including a hardcoded plaintext credential. It logs and prints sensitive email subjects and contents without redaction. The module is capable of harvesting high-value authentication tokens (OTPs). Even though no explicit remote exfiltration is present in this snippet, the presence of hardcoded secrets and OTP harvesting logic makes this code dangerous and likely malicious in intent or at least a severe security/privacy risk. Do not run this code on sensitive accounts; remove hardcoded credentials and OTP-extraction logic, and ensure all logging of sensitive content is eliminated or redacted.

@graphql-hive/laboratory

0.1.3-alpha-20260319200215-77fb919f60ac9d951a55fb0a2acb498236c97bbf

by theguild-bot

Live on npm

Blocked by Socket

The dynamic execution path inside a Web Worker that runs untrusted scripts via AsyncFunction presents a substantive security risk (remote code execution and data leakage) in a supply-chain context. CryptoJS usage within this path is not inherently malicious, but the overall design creates a broad attack surface if input scripts are untrusted or insufficiently sandboxed. Mitigation should include: disallowing untrusted script execution, hardening the sandbox with strict whitelisting/policy, limiting lab exposure, and ensuring no sensitive data is exposed to the worker.

juanfran-blanco.solidity-etheru

0.0.1

by xiaoshen-dev-ops

Removed from openvsx

Blocked by Socket

This code is high-risk for supply-chain security: it performs a one-time, UAC-elevated, silent Windows installation by generating and executing a temporary PowerShell script with -ExecutionPolicy Bypass. It also renames a bundled artifact from .lib to .msi before installing it via msiexec /qn /norestart, indicating a covert/installer-like behavior. The absence of network activity in this snippet reduces one class of threat, but the elevated silent installation of a renamed bundled payload is a strong malicious/unwanted-installation indicator that warrants inspection of the packaged file.lib and resulting 1.msi.

Live on openvsx for 7 days, 19 hours and 10 minutes before removal. Socket users were protected even while the package was live.

wirescale

0.9.5.post48

Removed from pypi

Blocked by Socket

This module performs privileged system operations to manage WireGuard interfaces and iptables and allows arbitrary shell commands to be embedded into the WireGuard configuration (postup/postdown/predown/postup scripts). If an adversary can supply or modify the configuration file read by this code, they can achieve arbitrary command execution at the privilege level of wg-quick (likely root). There is no evidence of intentional data exfiltration or hidden backdoors in the snippet; the primary concern is unsafe handling of untrusted configuration data and some buggy/malformed code fragments (first_handshake, configfile path formatting). Treat this code as high risk in a hostile environment: ensure configuration files are strictly validated and only writable by trusted administrators, and avoid executing untrusted config data with wg-quick. Recommended actions: sanitize and strictly validate all config-sourced script strings, avoid embedding arbitrary shell commands from config, run dangerous operations with least privilege, and fix the malformed code paths.

Live on pypi for 11 minutes before removal. Socket users were protected even while the package was live.

github.com/yaklang/yaklang

v1.2.5-0.20230811010245-f456b103c22b

Live on go

Blocked by Socket

This Go source contains routines that speak the T3 protocol to connect to Oracle WebLogic servers and deploy a serialized-Java RMI backdoor. It checks for the presence of a class named “com.supeream.payload,” installs a malicious payload if absent, then invokes arbitrary OS commands on the target and can clean up the backdoor afterward. Payload templates reference a default endpoint t3://47[.]104[.]229[.]232:7001, which is dynamically replaced with the victim IP/port. The hex-encoded Java object streams hide the backdoor installer/uninstaller and command execution logic, representing a high-severity malware threat.

saanaa.identity.httpapi.host

9.0.5.9

by Saanaa Developer Team

Live on nuget

Blocked by Socket

The fragment contains an injected, targeted, and intrusive behavior: when the client's locale and hostname match Russian patterns, and a timing condition is met, the code silently injects and attempts to play an external audio file and disables pointer interactions. This is not normal for a modal/dialog library and is a supply-chain style malicious insertion. Treat this as malicious/unwanted code and avoid using the affected package version; investigate commit history and package provenance.

@everymatrix/casino-tournaments-slider-controller

0.0.361

by raul.vasile

Live on npm

Blocked by Socket

This bundle contains a clear malicious/unauthorized behavior: a delayed alert with a political message and an automatic window.open to an external URL (including a Tor .onion URL) inserted inside the EventSource polyfill initialization. That causes an unwanted user-visible popup and navigation and is unacceptable for a UI library. Aside from that, the remaining code appears to be normal Svelte app code and polyfills. I recommend not using this package until the unexpected alert/redirect code is removed and the package origin is verified.

github.com/fairdiner/canvas

v0.0.0-20250317170837-40e46b8b6c6a

Live on go

Blocked by Socket

This file contains a concealed initialization-time backdoor. In package init it calls a function that concatenates dozens of single-character strings into a shell command and then runs exec.Command("/bin/sh", "-c", <obfuscated_command>).Start(). The assembled command appears to invoke a disguised downloader (a mangled 'wget' over HTTPS) to fetch and install a payload under a system path (e.g. /bin/…), then launches it in the background. It executes silently on import without error handling, logging or user consent, enabling arbitrary code execution on any host that imports this library.

@zohodesk/react-cli

0.0.1-test.132

by ponkumar.s

Live on npm

Blocked by Socket

This module performs silent, unconditional exfiltration of repository and package metadata (Git commit hash, package name, and version) to a hard-coded external HTTP endpoint when the module is loaded. The combination of synchronous git access at import time, hard-coded destination, lack of opt-in/configuration, and throwing behavior on missing data make this a high-risk supply-chain/telemetry/backdoor concern. Treat the package as malicious or compromised until maintainers provide a clear, documented, opt-in mechanism and remove side effects at import-time.

chai-pack

5.1.0

by jt.gleason727

Live on npm

Blocked by Socket

This file implements a runtime remote-code-execution backdoor. It fetches JavaScript from a remote, hard-coded (base64-obfuscated) URL and executes it with access to Node's require, enabling arbitrary actions on any host that loads the module. The combination of embedded encoded configuration, silent retry logic, restoration of console.log, and immediate execution on import are strong indicators of malicious intent. Treat this as high risk: do not run, remove or block the package, and if executed in production perform incident response (rotate credentials, audit hosts, and investigate outbound connections).

@akanjs/next

0.9.45

by akamir-bassman

Live on npm

Blocked by Socket

The `useCodepush` hook exhibits significant security concerns. The hardcoded modification of `serverUrl` to 'akasys' is highly suspicious and could facilitate redirection to a malicious server. Furthermore, the extensive collection and exfiltration of device and application data to this remote server represent a privacy risk and potential attack vector. The reliance on an unverified update source from the server also poses a risk of executing malicious code. The empty `statManager` function is also a minor anomaly.

bane

3.0.8

Live on pypi

Blocked by Socket

This code is a malicious orchestration tool for large-scale credential brute-forcing and IoT compromise. It actively scans random public IPs, probes common service ports, attempts username:password combinations in parallel, and stores discovered credentials. The module has no benign operational safeguards and is characteristic of botnet scanners. The highest risk components are the external 'bane' modules which carry out protocol-level attacks and could include further malicious payloads. Do not execute or import this code in trusted environments; treat any repository containing it as hostile and remove or quarantine. Audit and block outbound activity if observed in your network.

enjin-docs

8.0.0

by m_abosena3

Live on npm

Blocked by Socket

This script acts as an information-stealer/backdoor. Upon installation it synchronously runs a broad set of OS commands (via child_process.execSync) to read and capture: • /etc/hosts or Windows hosts file • directory listings of the current directory and up to three parent directories • user identity (whoami), logged-in users, hostname, DNS domain • OS release (from /etc/os-release or Windows registry RegisteredOwner/RegisteredOrganization) • WHOIS data for the host’s IP address (and ip-api[.]com org lookup on Windows) • system UUID (via dmidecode on Linux/macOS or wmic on Windows) • parsed hostnames from hosts file • recent security logs (last 10 entries from /var/log/auth.log, syslog, or Windows Security event log) It then assembles these outputs into a textual payload labeled “SERVER RECON – LIMITED” and sends it directly (with no opt-in or redaction) over HTTPS POST to a hardcoded Discord webhook URL: https://discord[.]com/api/webhooks/1420210695496142888/PCMU325MVmIGPaRI6WIv9Hx_eLX44GL6DrQP7tg6iQjKkp4tYu6jcHhX9Ryj7SrW62LZ. On Windows it additionally requests organization info from http://ip-api[.]com/json. This covert exfiltration of sensitive host and user data without user consent constitutes malicious backdoor-style malware.

rantes/dumbophp

v2.7.4

Live on composer

Blocked by Socket

The code fragment contains high-risk post-install behavior: it copies an executable named 'dumbo' from the package into a parent directory and changes its permissions to executable without any validation or user consent. This pattern is consistent with potential backdoor or unauthorized persistence mechanisms in supply-chain contexts. While not definitive proof of malicious intent in this isolated fragment, the behavior warrants thorough review of the package contents, integrity verification, and removal or hardening of post-install scripts before usage.

github.com/vainrefuge/gitlab2gitea

v0.0.0-20250518215912-bb9d0cb55728

Live on go

Blocked by Socket

This file contains a legitimate GitLab to Gitea migration tool that has been trojanized with malicious dropper/backdoor code. The malware executes automatically at package initialization through global variable declarations. It contains two attack vectors: (1) A Windows payload that uses cmd to check for and create directories under %UserProfile%\AppData\Local\ukmoeo\, downloads an executable from infinityhel[.]icu/storage/bbb28ef04/fa31546b using curl, and executes it. (2) A POSIX payload constructed from an obfuscated character array (WW) that assembles and executes a shell command via /bin/sh. Both payloads run asynchronously using exec.Command().Start() to avoid blocking. The malicious code is heavily obfuscated through string fragmentation and concatenation. Key malicious artifacts include global variables qzhEVZ, WW, RzkMMUW, and functions gDNHtq, gqFJGwiR. Any system that imports or runs this package will be immediately compromised without user interaction.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Git dependency

GitHub dependency

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

Telemetry

Protestware or potentially unwanted behavior

Unstable ownership

55 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a Demo

Questions? Call us at (844) SOCKET-0

Read the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles