Launch Week Day 5: Introducing Reachability for PHP.Learn More
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.5

We protect you from vulnerable and malicious packages

openclaw-android

2026.2.22

by yunze7373

Live on npm

Blocked by Socket

[Skill Scanner] Backtick command substitution detected (AITech 9.1.4) [CI003]

curri-slack

10.23.1000

Removed from npm

Blocked by Socket

The code exhibits clear signs of malicious behavior by exfiltrating system and project information to external servers. It poses a significant security risk due to unauthorized data transmission and potential privacy violations.

Live on npm for 12 days, 16 hours and 46 minutes before removal. Socket users were protected even while the package was live.

tx-engine

0.5.3

Live on pypi

Blocked by Socket

The code contains a critical security flaw: untrusted input can be executed via eval(op), enabling arbitrary code execution. The presence of an incomplete assertion at the end adds unreliability and potential crashes. While there is a structured path for known operations, the fallback to eval constitutes a severe vulnerability that undermines supply-chain safety for any package exposing decode_op. Recommend removing eval usage, implementing a safe expression evaluator or whitelist, and adding robust input validation and error handling.

routerxpl

0.6.2

Live on pypi

Blocked by Socket

This code is a high-confidence, weaponized UPnP/SSDP UDP exploit module intended for blind command injection/RCE against specific D-Link DIR routers. It fingerprints targets using UDP responses and, upon matching, launches a command loop/shell that repeatedly sends attacker-controlled commands embedded into an SSDP M-SEARCH protocol field. While the snippet includes a likely typo in check()’s final return and relies on wildcard-imported framework helpers (which may affect exact runtime behavior), the offensive payload construction and shell invocation clearly indicate dangerous intent.

rfmux

1.4.1

Live on pypi

Blocked by Socket

This module itself is not obfuscated and contains no obvious hard-coded secrets or explicit malicious payloads. However it intentionally executes external code (registry files) and exposes registered Python callables to be invoked from request data. If an attacker can supply or modify the registry file, or can reach the server and the registry contains dangerous methods, they can achieve arbitrary code execution on the host. Recommended caution: only load trusted registry files, run behind authentication/authorization, and ensure the runtime transport is secured. For untrusted environments, treat this as high-risk functionality.

vdr

2.0.3

Live on pypi

Blocked by Socket

This module implements continuous microphone recording and cleartext UDP streaming of recorded audio to a remote host, then deletes local copies. The behavior is highly privacy-invasive and consistent with audio exfiltration/spyware. Without strong, explicit legitimate justification and additional protections (encryption, auth, consent, error handling and controls), this code should be considered dangerous and not used in production or on sensitive hosts.

github.com/sourcegraph/sourcegraph

v0.0.0-20210209151613-19f1c602d9e7

Live on go

Blocked by Socket

This module is a deliberate destructive utility that corrupts all .zip files in a specified directory by truncating each archive to half its size and appending repeated junk data. While it lacks common malware features like networking or data exfiltration, the behavior is strongly indicative of sabotage and would be unacceptable in most software supply-chain contexts due to its potential to break builds, deployments, or artifact integrity.

prism-commercial-ui

100.100.105

by jwosborniv

Removed from npm

Blocked by Socket

This script is attempting to exfiltrate sensitive data (contents of /etc/passwd) to a remote server. This behavior is highly malicious and poses a significant security risk.

Live on npm for 1 hour and 25 minutes before removal. Socket users were protected even while the package was live.

crowd-components

141.0.0

by yandex.pizda

Removed from npm

Blocked by Socket

The code is engaging in malicious behavior by exfiltrating environment variables to an external server. The use of obfuscation indicates an attempt to hide this behavior.

Live on npm for 30 minutes before removal. Socket users were protected even while the package was live.

github.com/bishopfox/sliver

v1.4.9-0.20210406091252-1a5335ab9e57

Live on go

Blocked by Socket

This file implements a DNS-based command-and-control transport (Sliver implant DNS C2). It encodes, fragments and transmits encrypted payloads via DNS TXT queries to an operator-controlled parent domain and receives commands the same way. The code provides full C2 capabilities (session bootstrap, encrypted send/receive, block reassembly). It also includes weaknesses: insecure random number generator for nonces/IDs and an unbounded in-memory replay cache. Given its functionality, this code is malicious in the general software supply-chain context and poses a high security risk if present in a dependency.

amazon-discount-code-ireland-2-off-february-2023391

1.0.2

by micheal2520

Removed from npm

Blocked by Socket

This Python script implements a supply chain attack by automatically generating and mass-publishing spam packages to the npm registry. The malware operates in an infinite loop, publishing 100 packages per cycle by: (1) randomly selecting from hardcoded folder paths containing game/service-related templates, (2) copying and modifying template files (index.js, package.json, README.md) with dynamically generated content, (3) systematically replacing 'hack' keywords with 'new' to evade detection, (4) executing 'npm publish' commands via subprocess to automatically publish packages, (5) verifying publication success by checking npmjs[.]com URLs, and (6) generating SEO-optimized HTML links with external domain references for link manipulation. The script reads configuration data including domain names and keywords from text files, uses random string generation for package naming, and maintains output logs of successful publications. This represents a significant threat to npm ecosystem integrity through deliberate package registry pollution and constitutes malware due to its clear malicious intent to deceive users and abuse infrastructure.

Live on npm for 2 hours and 23 minutes before removal. Socket users were protected even while the package was live.

@leverageaiapps/locus

2.3.2

by leverageaiapp

Live on npm

Blocked by Socket

The provided code functions as a remote tunneling/agent that exposes powerful primitives: arbitrary file read/write, directory listing, remote command execution output forwarding, and HTTP/WebSocket proxying to localhost. In an environment where the gateway is untrusted or compromised, this module would enable data exfiltration, local service access, and remote file modification — effectively a backdoor. If this agent is intentionally installed and the gateway is trusted (e.g., a legitimate remote support/control server), the behavior may be acceptable. However, absent clear authentication/authorization controls in the shown fragment, this code presents a high-risk capability and should be treated as dangerous if used without strict access controls and auditability.

web3-agent-browser

0.2.1

by ivanzz

Live on npm

Blocked by Socket

This module combines remote EVM signing/transaction functionality with an explicit MAIN-world CSP bypass that removes both enforcing and report-only CSP meta tags (including dynamically added ones). It also broadens interaction scope via content-script registration and broadcasts provider events to all tabs. While it does not show direct keylogging or system file access in this fragment, the CSP-defeat mechanism is a high-severity red flag consistent with malicious capability or policy evasion, making the overall supply-chain security risk high.

@egodesign/komatsu-uikit

0.0.54

by kimeyrc

Live on npm

Blocked by Socket

Cannot perform security analysis due to heavily obfuscated/corrupted source code and incomplete security report. The extreme level of obfuscation itself is a major red flag indicating potential malicious content.

@qingchencloud/openclaw-zh

2026.2.14-nightly.202602151554

Live on npm

Blocked by Socket

The provided specification is a legitimate tool description for managing Feishu permissions and does not itself contain code-level indicators of malware, obfuscation, or backdoors. The main security risks are operational: acceptance and use of a high-privilege token without guidance on secure handling, and the absence of explicit API endpoints which creates uncertainty about where tokens/requests will be sent. Recommendations: keep the tool disabled by default; require explicit opt-in and documented network endpoints that must be verified to be official Feishu APIs; enforce least-privilege, short-lived tokens; implement logging redaction and audit trails; and perform code review on any implementation to ensure tokens are not logged, persisted insecurely, or proxied through third parties.

@o861runners/dotenvrtdb

1.260408.10848

by o861.runners

Live on npm

Blocked by Socket

This fragment implements a remote-triggered emergency stop mechanism with clearly destructive behavior. An SSE payload that indicates ownership mismatch directly triggers cancellation of GitHub Actions and Azure DevOps builds using environment-provided credentials, followed by aggressive Docker Compose teardown (including volumes) and forceful local process termination (cgroup PID SIGKILLs and process-group SIGTERM/SIGKILL), then exits. While it could be intended for a legitimate runner takeover/self-protection workflow, the combination of remote data control plus high-impact disruption is strongly consistent with sabotage/hostile functionality if the SSE endpoint or signal can be influenced.

mrg-nano-xhr

20.764.459

Removed from npm

Blocked by Socket

The code exhibits behaviors consistent with data exfiltration and unauthorized network communication. The use of obfuscation and dynamic DNS resolution further indicates potential malicious intent.

compy-payments

0.2.1

by compy-ryu

Live on npm

Blocked by Socket

The source code implements functions that send highly sensitive payment card data, including security codes and passwords, to a suspicious and unknown external domain without safeguards or user consent. This behavior constitutes a high-risk data exfiltration and is indicative of malicious intent or a severe supply chain security compromise. The code is not obfuscated but poses a significant security risk. The existing reports are invalid and provide no useful information. This package should be considered dangerous and avoided.

fray

3.5.134

Live on pypi

Blocked by Socket

This file is a concentrated collection of active exploit/deserialization payloads designed to detect or trigger known gadget chains and vulnerabilities across multiple platforms. While formatted as a testing catalog, its content is inherently dangerous: it includes explicit command-execution payloads, remote class-loading references, and authentication-bypass tokens. If found in a codebase or dependency, treat as high-risk—remove from production, restrict access, audit any use or transmission logs, and verify no unauthorized target interactions occurred. Only use in controlled, authorized testing environments.

mgcomtools

0.1.51

Live on pypi

Blocked by Socket

This file contains a function that processes an input message by printing it locally and sending it via an HTTP POST request to an external API endpoint (https://api.example.com/bot<TOKEN>/sendMessage?chat_id=<CHANNEL_ID>&text=<MESSAGE>). The function uses hardcoded sensitive credentials—a bot token and channel ID—which, if compromised, could allow an attacker to exfiltrate data from systems where the code is deployed. By automatically forwarding any given message to a predetermined external channel, the function establishes a covert channel for data leakage, presenting a significant security risk.

sbcli-dev

4.0.41

Live on pypi

Blocked by Socket

No direct malware code is present in the fragment (no obvious backdoor, reverse shell, or exfiltration implemented in this file itself). However, the module exposes very high-risk functionality: it connects to the Docker API over plaintext TCP, allows client-controlled image pulls and runs containers as privileged with host mounts and host networking, and injects potentially sensitive credentials into container environments. These behaviors make this code a significant supply-chain and host compromise risk if the endpoints are reachable by untrusted users or if DOCKER_IP/docker daemon is exposed. Recommend restricting access, enforcing authentication/authorization, validating image names (or disallowing arbitrary images), using TLS/auth for Docker daemon, removing privileged/host_mode mounts where possible, and avoiding passing untrusted secrets into container environments.

dnszlsk/muad-dib

144698d93ca2d4364a970d755f7b4c6f756a09fd

Live on actions

Blocked by Socket

This module is strongly indicative of malicious supply-chain credential theft. It reads a sensitive npm token from the environment and executes curl to POST that token to a hardcoded attacker-controlled endpoint. It also reads .npmrc, consistent with secret harvesting. The behavior is not aligned with legitimate package functionality.

koishi-plugin-hisoutensoku-jammer

12.1.1

by nanahira

Live on npm

Blocked by Socket

The analyzed code implements a jammer/attack plugin that autonomously derives target addresses from message content and OCR-derived data and conducts UDP-based attacks within a configurable timeout window. This reveals explicit network-abuse capabilities and potential misuse in a supply-chain context, marking it as high-risk for inclusion in public dependencies without robust safeguards, access controls, and explicit authorization.

openclaw-android

2026.2.22

by yunze7373

Live on npm

Blocked by Socket

[Skill Scanner] Backtick command substitution detected (AITech 9.1.4) [CI003]

curri-slack

10.23.1000

Removed from npm

Blocked by Socket

The code exhibits clear signs of malicious behavior by exfiltrating system and project information to external servers. It poses a significant security risk due to unauthorized data transmission and potential privacy violations.

Live on npm for 12 days, 16 hours and 46 minutes before removal. Socket users were protected even while the package was live.

tx-engine

0.5.3

Live on pypi

Blocked by Socket

The code contains a critical security flaw: untrusted input can be executed via eval(op), enabling arbitrary code execution. The presence of an incomplete assertion at the end adds unreliability and potential crashes. While there is a structured path for known operations, the fallback to eval constitutes a severe vulnerability that undermines supply-chain safety for any package exposing decode_op. Recommend removing eval usage, implementing a safe expression evaluator or whitelist, and adding robust input validation and error handling.

routerxpl

0.6.2

Live on pypi

Blocked by Socket

This code is a high-confidence, weaponized UPnP/SSDP UDP exploit module intended for blind command injection/RCE against specific D-Link DIR routers. It fingerprints targets using UDP responses and, upon matching, launches a command loop/shell that repeatedly sends attacker-controlled commands embedded into an SSDP M-SEARCH protocol field. While the snippet includes a likely typo in check()’s final return and relies on wildcard-imported framework helpers (which may affect exact runtime behavior), the offensive payload construction and shell invocation clearly indicate dangerous intent.

rfmux

1.4.1

Live on pypi

Blocked by Socket

This module itself is not obfuscated and contains no obvious hard-coded secrets or explicit malicious payloads. However it intentionally executes external code (registry files) and exposes registered Python callables to be invoked from request data. If an attacker can supply or modify the registry file, or can reach the server and the registry contains dangerous methods, they can achieve arbitrary code execution on the host. Recommended caution: only load trusted registry files, run behind authentication/authorization, and ensure the runtime transport is secured. For untrusted environments, treat this as high-risk functionality.

vdr

2.0.3

Live on pypi

Blocked by Socket

This module implements continuous microphone recording and cleartext UDP streaming of recorded audio to a remote host, then deletes local copies. The behavior is highly privacy-invasive and consistent with audio exfiltration/spyware. Without strong, explicit legitimate justification and additional protections (encryption, auth, consent, error handling and controls), this code should be considered dangerous and not used in production or on sensitive hosts.

github.com/sourcegraph/sourcegraph

v0.0.0-20210209151613-19f1c602d9e7

Live on go

Blocked by Socket

This module is a deliberate destructive utility that corrupts all .zip files in a specified directory by truncating each archive to half its size and appending repeated junk data. While it lacks common malware features like networking or data exfiltration, the behavior is strongly indicative of sabotage and would be unacceptable in most software supply-chain contexts due to its potential to break builds, deployments, or artifact integrity.

prism-commercial-ui

100.100.105

by jwosborniv

Removed from npm

Blocked by Socket

This script is attempting to exfiltrate sensitive data (contents of /etc/passwd) to a remote server. This behavior is highly malicious and poses a significant security risk.

Live on npm for 1 hour and 25 minutes before removal. Socket users were protected even while the package was live.

crowd-components

141.0.0

by yandex.pizda

Removed from npm

Blocked by Socket

The code is engaging in malicious behavior by exfiltrating environment variables to an external server. The use of obfuscation indicates an attempt to hide this behavior.

Live on npm for 30 minutes before removal. Socket users were protected even while the package was live.

github.com/bishopfox/sliver

v1.4.9-0.20210406091252-1a5335ab9e57

Live on go

Blocked by Socket

This file implements a DNS-based command-and-control transport (Sliver implant DNS C2). It encodes, fragments and transmits encrypted payloads via DNS TXT queries to an operator-controlled parent domain and receives commands the same way. The code provides full C2 capabilities (session bootstrap, encrypted send/receive, block reassembly). It also includes weaknesses: insecure random number generator for nonces/IDs and an unbounded in-memory replay cache. Given its functionality, this code is malicious in the general software supply-chain context and poses a high security risk if present in a dependency.

amazon-discount-code-ireland-2-off-february-2023391

1.0.2

by micheal2520

Removed from npm

Blocked by Socket

This Python script implements a supply chain attack by automatically generating and mass-publishing spam packages to the npm registry. The malware operates in an infinite loop, publishing 100 packages per cycle by: (1) randomly selecting from hardcoded folder paths containing game/service-related templates, (2) copying and modifying template files (index.js, package.json, README.md) with dynamically generated content, (3) systematically replacing 'hack' keywords with 'new' to evade detection, (4) executing 'npm publish' commands via subprocess to automatically publish packages, (5) verifying publication success by checking npmjs[.]com URLs, and (6) generating SEO-optimized HTML links with external domain references for link manipulation. The script reads configuration data including domain names and keywords from text files, uses random string generation for package naming, and maintains output logs of successful publications. This represents a significant threat to npm ecosystem integrity through deliberate package registry pollution and constitutes malware due to its clear malicious intent to deceive users and abuse infrastructure.

Live on npm for 2 hours and 23 minutes before removal. Socket users were protected even while the package was live.

@leverageaiapps/locus

2.3.2

by leverageaiapp

Live on npm

Blocked by Socket

The provided code functions as a remote tunneling/agent that exposes powerful primitives: arbitrary file read/write, directory listing, remote command execution output forwarding, and HTTP/WebSocket proxying to localhost. In an environment where the gateway is untrusted or compromised, this module would enable data exfiltration, local service access, and remote file modification — effectively a backdoor. If this agent is intentionally installed and the gateway is trusted (e.g., a legitimate remote support/control server), the behavior may be acceptable. However, absent clear authentication/authorization controls in the shown fragment, this code presents a high-risk capability and should be treated as dangerous if used without strict access controls and auditability.

web3-agent-browser

0.2.1

by ivanzz

Live on npm

Blocked by Socket

This module combines remote EVM signing/transaction functionality with an explicit MAIN-world CSP bypass that removes both enforcing and report-only CSP meta tags (including dynamically added ones). It also broadens interaction scope via content-script registration and broadcasts provider events to all tabs. While it does not show direct keylogging or system file access in this fragment, the CSP-defeat mechanism is a high-severity red flag consistent with malicious capability or policy evasion, making the overall supply-chain security risk high.

@egodesign/komatsu-uikit

0.0.54

by kimeyrc

Live on npm

Blocked by Socket

Cannot perform security analysis due to heavily obfuscated/corrupted source code and incomplete security report. The extreme level of obfuscation itself is a major red flag indicating potential malicious content.

@qingchencloud/openclaw-zh

2026.2.14-nightly.202602151554

Live on npm

Blocked by Socket

The provided specification is a legitimate tool description for managing Feishu permissions and does not itself contain code-level indicators of malware, obfuscation, or backdoors. The main security risks are operational: acceptance and use of a high-privilege token without guidance on secure handling, and the absence of explicit API endpoints which creates uncertainty about where tokens/requests will be sent. Recommendations: keep the tool disabled by default; require explicit opt-in and documented network endpoints that must be verified to be official Feishu APIs; enforce least-privilege, short-lived tokens; implement logging redaction and audit trails; and perform code review on any implementation to ensure tokens are not logged, persisted insecurely, or proxied through third parties.

@o861runners/dotenvrtdb

1.260408.10848

by o861.runners

Live on npm

Blocked by Socket

This fragment implements a remote-triggered emergency stop mechanism with clearly destructive behavior. An SSE payload that indicates ownership mismatch directly triggers cancellation of GitHub Actions and Azure DevOps builds using environment-provided credentials, followed by aggressive Docker Compose teardown (including volumes) and forceful local process termination (cgroup PID SIGKILLs and process-group SIGTERM/SIGKILL), then exits. While it could be intended for a legitimate runner takeover/self-protection workflow, the combination of remote data control plus high-impact disruption is strongly consistent with sabotage/hostile functionality if the SSE endpoint or signal can be influenced.

mrg-nano-xhr

20.764.459

Removed from npm

Blocked by Socket

The code exhibits behaviors consistent with data exfiltration and unauthorized network communication. The use of obfuscation and dynamic DNS resolution further indicates potential malicious intent.

compy-payments

0.2.1

by compy-ryu

Live on npm

Blocked by Socket

The source code implements functions that send highly sensitive payment card data, including security codes and passwords, to a suspicious and unknown external domain without safeguards or user consent. This behavior constitutes a high-risk data exfiltration and is indicative of malicious intent or a severe supply chain security compromise. The code is not obfuscated but poses a significant security risk. The existing reports are invalid and provide no useful information. This package should be considered dangerous and avoided.

fray

3.5.134

Live on pypi

Blocked by Socket

This file is a concentrated collection of active exploit/deserialization payloads designed to detect or trigger known gadget chains and vulnerabilities across multiple platforms. While formatted as a testing catalog, its content is inherently dangerous: it includes explicit command-execution payloads, remote class-loading references, and authentication-bypass tokens. If found in a codebase or dependency, treat as high-risk—remove from production, restrict access, audit any use or transmission logs, and verify no unauthorized target interactions occurred. Only use in controlled, authorized testing environments.

mgcomtools

0.1.51

Live on pypi

Blocked by Socket

This file contains a function that processes an input message by printing it locally and sending it via an HTTP POST request to an external API endpoint (https://api.example.com/bot<TOKEN>/sendMessage?chat_id=<CHANNEL_ID>&text=<MESSAGE>). The function uses hardcoded sensitive credentials—a bot token and channel ID—which, if compromised, could allow an attacker to exfiltrate data from systems where the code is deployed. By automatically forwarding any given message to a predetermined external channel, the function establishes a covert channel for data leakage, presenting a significant security risk.

sbcli-dev

4.0.41

Live on pypi

Blocked by Socket

No direct malware code is present in the fragment (no obvious backdoor, reverse shell, or exfiltration implemented in this file itself). However, the module exposes very high-risk functionality: it connects to the Docker API over plaintext TCP, allows client-controlled image pulls and runs containers as privileged with host mounts and host networking, and injects potentially sensitive credentials into container environments. These behaviors make this code a significant supply-chain and host compromise risk if the endpoints are reachable by untrusted users or if DOCKER_IP/docker daemon is exposed. Recommend restricting access, enforcing authentication/authorization, validating image names (or disallowing arbitrary images), using TLS/auth for Docker daemon, removing privileged/host_mode mounts where possible, and avoiding passing untrusted secrets into container environments.

dnszlsk/muad-dib

144698d93ca2d4364a970d755f7b4c6f756a09fd

Live on actions

Blocked by Socket

This module is strongly indicative of malicious supply-chain credential theft. It reads a sensitive npm token from the environment and executes curl to POST that token to a hardcoded attacker-controlled endpoint. It also reads .npmrc, consistent with secret harvesting. The behavior is not aligned with legitimate package functionality.

koishi-plugin-hisoutensoku-jammer

12.1.1

by nanahira

Live on npm

Blocked by Socket

The analyzed code implements a jammer/attack plugin that autonomously derives target addresses from message content and OCR-derived data and conducts UDP-based attacks within a configurable timeout window. This reveals explicit network-abuse capabilities and potential misuse in a supply-chain context, marking it as high-risk for inclusion in public dependencies without robust safeguards, access controls, and explicit authorization.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Git dependency

GitHub dependency

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

Telemetry

Protestware or potentially unwanted behavior

Unstable ownership

55 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a Demo

Questions? Call us at (844) SOCKET-0

Read the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles