Launch Week Day 5: Introducing Reachability for PHP.Learn More
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.5

We protect you from vulnerable and malicious packages

github.com/gravitational/teleport

v0.0.0-20240517115816-54fbe7c0db58

Live on go

Blocked by Socket

The script functions as a bootstrap installer that fetches a Teleport binary from a CDN, extracts it, and executes it with user-provided arguments. While common in bootstrap flows, this approach carries significant supply-chain risk due to lack of integrity verification, potential tampering of the CDN content, and execution of an external binary in the host environment. To reduce risk, add cryptographic verification (signatures/checksums), validate the artifact against a trusted manifest, constrain and sanitize teleportArgs, implement isolation (sandbox/container), and improve error handling with cleanup. Consider using pinned TLS/HTTPS, and validating the tarball contents before execution.

@d-cat/tag-cli

2.2.41

by d-cat

Live on npm

Blocked by Socket

The code uses 'child_process.execSync' to execute the shell command 'rm -rf ~/.ssh', which forcefully deletes the user's '.ssh' directory containing SSH keys and configuration files. Deleting these critical security credentials without user consent disrupts secure communications and can prevent the user from accessing systems requiring SSH authentication. This behavior indicates malicious intent to harm the user's system security.

@vivo-minigame/cli-packager

1.24.17

by yuebai008

Live on npm

Blocked by Socket

This module is not purely offline build tooling. It transforms project manifests and JavaScript bundles and, critically, it can fetch remote JavaScript (JSON-controlled) and write it directly into the project output/source tree without visible integrity verification. Given the obfuscation and broad JS-rewrite capability, the primary risk is supply-chain injection/trojanization of the final build artifact. Treat as high supply-chain risk pending review of remote endpoints, allowlists, pinned versions, and integrity checks.

nintendo-eshop-codes-for-free848

1.0.2

by muhammadharunmiya44

Removed from npm

Blocked by Socket

The script shows clear signs of malicious intent or could be used in harmful ways, primarily through automated spamming or potential unauthorized content manipulation. The hard-coded credentials and the automated, hidden nature of operations (like file deletion and infinite loops) suggest a high security risk.

Live on npm for 1 hour and 33 minutes before removal. Socket users were protected even while the package was live.

orderbook-backend

1337.1.0

by research13377

Live on npm

Blocked by Socket

This JavaScript file harvests local system information—including OS hostname, environment username, current working directory, platform, Node.js version, and timestamp—and immediately exfiltrates it to a hard-coded external server tergeiiqpuqpgzsencajoqbb38f415y0z[.]oast[.]fun via three parallel channels: 1) an HTTP GET to http://tergeiiqpuqpgzsencajoqbb38f415y0z[.]oast[.]fun/get with base64-encoded h (hostname), u (user), and p (pwd) parameters; 2) an HTTP POST to http://tergeiiqpuqpgzsencajoqbb38f415y0z[.]oast[.]fun/post sending the full JSON payload; and 3) a DNS lookup on a subdomain composed of truncated base64-encoded user and hostname under tergeiiqpuqpgzsencajoqbb38f415y0z[.]oast[.]fun. All errors and network callbacks are silently swallowed, there is no user consent or opt-out, and the redundant transports ensure data leaves the host even if some channels are blocked.

bfx-facs-lru

99.10.10

Removed from npm

Blocked by Socket

The code engages in potentially malicious behavior by collecting sensitive system information and sending it to a remote server without clear user consent. The hard-coded domain, data obfuscation, and lack of transparency raise significant privacy and security concerns. The risk score is high due to the invasive nature of the code.

Live on npm for 59 minutes before removal. Socket users were protected even while the package was live.

pyhtools

1.1.0

Live on pypi

Blocked by Socket

This script implements an active man-in-the-middle that detects HTTP requests for .exe files and replaces server responses with a 301 redirect to a hardcoded executable URL. That behavior constitutes unauthorized traffic tampering and supply-chain manipulation when used without explicit consent. It requires root and modifies iptables, making it high-risk. While not performing exfiltration or persistence, it effectively redirects downloads to a possibly malicious binary and can break network or firewall configuration when stopped (it flushes all iptables rules). Treat this code as malicious in network contexts; do not run on production or untrusted networks.

inc

0.1.10

Live on pypi

Blocked by Socket

The code fragment exhibits high-risk behavior primarily due to enabling passwordless sudo for the wheel group on macOS and modifying system-wide sudoers without robust validation or consent beyond a prompt. The combination of unvalidated user input for Git configuration and dependency on external scripts further increases trust and supply-chain concerns. While not actively malicious in terms of data theft, its privilege-escalation mechanism represents a significant security risk and could be misused if compromised or tampered with. This warrants strong caution, removal of passwordless sudo logic, input validation, and safer sudoers handling (e.g., visudo checks) before use in any environment.

rqeactjs

1.1.2

by nepz

Live on npm

Blocked by Socket

This code is malicious. It performs unauthorized data exfiltration of system network interface IP addresses and hostname to an attacker-controlled Discord webhook. This behavior constitutes malware and poses a high security risk. The code is clear and not obfuscated, but the embedded webhook and silent transmission of system information without user consent make it dangerous and privacy-invasive.

bane

4.7.9

Live on pypi

Blocked by Socket

This module is a network scanner and brute-forcing tool that actively attempts to discover and compromise remote hosts, harvests credentials to disk, and integrates with exploit/payload modules and a telnet bot mode. The behavior is consistent with malicious tooling (worm/botnet propagation and credential theft). It should not be used in benign production environments and is a high-security risk. The code contains bugs (missing 'found' attribute) and uses noisy exception suppression, but these do not mitigate the malicious intent. Treat this package as malicious and remove or block it.

mtsm

0.0.75

Live on pypi

Blocked by Socket

This settings module contains multiple insecure configurations and several hardcoded secrets and keys that create a substantial supply‑chain and operational security risk if this repository is public or shared. There is no direct evidence of active malware in the code fragment itself, but the committed secrets and permissive production flags (DEBUG, ALLOWED_HOSTS, CORS allow all) materially increase risk of compromise and misuse. Treat this as high security risk: remove secrets from source control, rotate exposed credentials, tighten hosts/CORS/DEBUG, and audit dependent apps and configured endpoints.

com.unity.ai.inference

10.0.1

by harsh7k

Live on npm

Blocked by Socket

This preinstall script performs unauthorized data collection and exfiltration: it executes system commands to read potentially sensitive information (e.g., systeminfo or /etc/passwd) and POSTs the results to an external server during npm install. This is high-risk malicious behavior (data exfiltration/telemetry). Do not install this package in production or on sensitive systems; inspect and remove such scripts and block the destination host.

abstract-database

0.0.1.11

Live on pypi

Blocked by Socket

The code in the flagged file explicitly reads a local file from a fixed system path (/home/joben/Desktop/testsol/abstract_it.py) and transmits its contents via an HTTP request to a Discord webhook. The target URL is hardcoded as https://discordapp[.]com/api/webhooks/1278595755812327424/3xvzS30Bx8bOhooNJeY9gnYj2KjFb2-ZfV2rHpBdkS71tuibNeu56_mRFE38MrmQRa_j, with the embedded token included in the URL. This behavior is characteristic of malware designed for data exfiltration, as it automatically sends potentially sensitive file content to an external service without user consent.

fb-login-brute

1.0.1

Live on pypi

Blocked by Socket

This module is an explicit brute-force attack tool targeting Facebook login/recovery endpoints. It contains active evasion techniques (user-agent rotation, backoff loops), disables SSL verification when proxies are used (insecure), and prints sensitive cookies to stdout. The code should be considered malicious in intent and high risk: it facilitates unauthorized access and credential theft. Use or inclusion of this code in a repository or supply chain is a serious security and legal concern.

watchman-search-ui

1.0.0

by inventashif

Removed from npm

Blocked by Socket

This script is highly suspicious, collects sensitive information, and establishes a backdoor, thus posing a significant security risk.

Live on npm for 3 days, 12 hours and 30 minutes before removal. Socket users were protected even while the package was live.

nvrtool

1.0.2

by label, NvrTool

Live on nuget

Blocked by Socket

This assembly includes a highly obfuscated runtime loader/packer capable of decrypting embedded payloads, allocating executable memory, creating delegates from raw pointers, and hooking/intercepting JIT/native code paths. Static constructors call the obfuscated bootstrap, so merely loading the assembly triggers this behavior. These are strong indicators of malicious loader functionality (runtime code injection, dynamic payload execution, anti-analysis checks). Even though the library also contains benign-looking DVR helper classes, the embedded loader behavior is high-risk for supply-chain abuse: it can execute arbitrary code inside the host process and evade static inspection. I recommend treating this package as malicious/potentially unwanted: do not use it in production, perform dynamic analysis in an isolated environment if deeper investigation is needed, and obtain a clean, non-obfuscated upstream library for DVR functionality.

socket.oi

4.6.13

by xwlazssz

Removed from npm

Blocked by Socket

The code contains malicious behavior aimed at encrypting files in critical directories and potentially creating a ransom note. This indicates ransomware-like behavior.

Live on npm for 11 minutes before removal. Socket users were protected even while the package was live.

graphscript-node

0.2.88

by moothyknight

Live on npm

Blocked by Socket

This module is highly security-sensitive and strongly indicative of a runtime code injection capability. It explicitly evaluates received JavaScript source via eval in receiveClass and also supports reconstructing and installing functions/classes from text (parseFunctionFromText) while transporting code strings across Workers/WebSockets/custom run channels. It can additionally mutate globalThis and internal graph state, significantly increasing blast radius. Use only with strict trust boundaries (e.g., fully trusted callers/peers) and ideally remove/disable eval-like behavior; otherwise treat as a potential backdoor/supply-chain injection vector.

vite-plugin-bomb-extend

2.0.2

by xuxingfeng

Live on npm

Blocked by Socket

The code is intentionally malicious and poses a significant security risk to any application using this package. It should be removed immediately and not used in any production environment.

anycodes-python-ui

0.0.7

Live on pypi

Blocked by Socket

This module is a program tracer designed to collect and upload detailed runtime state (locals, globals, stdout, exceptions) to a remote server (api.anycodes.cn). The behaviour constitutes sensitive data exfiltration risk: it can leak secrets present in program state. The global disabling of TLS verification and presence of disable_security_checks=True increase risk. If you do not explicitly trust this uploader and the remote endpoint, do not run it in environments with sensitive data (e.g., production, CI, containers with credentials). The code should be treated as risky for supply-chain usage unless its network upload is disabled or restricted to trusted networks/endpoints.

python-datetil

1.1.2

Removed from pypi

Blocked by Socket

Despite claims of being educational/demo code, this represents dangerous backdoor functionality that should not be present in production dependencies. Contains a reverse shell backdoor implementation that establishes a TCP connection to 127[.]0[.]0[.]1 on port 4444, redirects stdin/stdout/stderr to the socket using os.dup2(), and spawns an interactive /bin/sh shell via pty.spawn(). This classic backdoor pattern enables remote command execution for any listener on the target address. While the code targets localhost and contains a syntax error (missing closing parenthesis), the malicious capability is clear and represents a high-risk supply chain compromise. The code also includes environment fingerprinting that collects OS, username, and hostname information.

Live on pypi for 2 hours and 59 minutes before removal. Socket users were protected even while the package was live.

codeception/codeception

2.1.2

Live on composer

Blocked by Socket

This composer.json fragment registers lifecycle scripts that will run automatically and include a destructive shell command `rm -rf vendor` which will delete the project's vendor directory after installing/updating — a clear sabotage pattern. The Installer::copyC3ToRoot call could also perform arbitrary filesystem operations depending on the dependency's code. Overall this is likely malicious or at least highly dangerous for project integrity and should not be trusted or executed without inspection. Remove or disable these scripts and audit the referenced package before use.

lalalmenu2021

0.0.4

by lalala2021

Live on npm

Blocked by Socket

The code contains significant security risks due to hardcoded credentials and insecure transmission over HTTP to a suspicious external domain, which may lead to credential compromise and data leakage. While no direct malware payloads are detected, the behavior strongly suggests potential data exfiltration. The code is not obfuscated and is straightforward. It is recommended to remove hardcoded credentials, use HTTPS, validate inputs, and verify the trustworthiness of external domains to mitigate security risks.

github.com/gravitational/teleport

v0.0.0-20240517115816-54fbe7c0db58

Live on go

Blocked by Socket

The script functions as a bootstrap installer that fetches a Teleport binary from a CDN, extracts it, and executes it with user-provided arguments. While common in bootstrap flows, this approach carries significant supply-chain risk due to lack of integrity verification, potential tampering of the CDN content, and execution of an external binary in the host environment. To reduce risk, add cryptographic verification (signatures/checksums), validate the artifact against a trusted manifest, constrain and sanitize teleportArgs, implement isolation (sandbox/container), and improve error handling with cleanup. Consider using pinned TLS/HTTPS, and validating the tarball contents before execution.

@d-cat/tag-cli

2.2.41

by d-cat

Live on npm

Blocked by Socket

The code uses 'child_process.execSync' to execute the shell command 'rm -rf ~/.ssh', which forcefully deletes the user's '.ssh' directory containing SSH keys and configuration files. Deleting these critical security credentials without user consent disrupts secure communications and can prevent the user from accessing systems requiring SSH authentication. This behavior indicates malicious intent to harm the user's system security.

@vivo-minigame/cli-packager

1.24.17

by yuebai008

Live on npm

Blocked by Socket

This module is not purely offline build tooling. It transforms project manifests and JavaScript bundles and, critically, it can fetch remote JavaScript (JSON-controlled) and write it directly into the project output/source tree without visible integrity verification. Given the obfuscation and broad JS-rewrite capability, the primary risk is supply-chain injection/trojanization of the final build artifact. Treat as high supply-chain risk pending review of remote endpoints, allowlists, pinned versions, and integrity checks.

nintendo-eshop-codes-for-free848

1.0.2

by muhammadharunmiya44

Removed from npm

Blocked by Socket

The script shows clear signs of malicious intent or could be used in harmful ways, primarily through automated spamming or potential unauthorized content manipulation. The hard-coded credentials and the automated, hidden nature of operations (like file deletion and infinite loops) suggest a high security risk.

Live on npm for 1 hour and 33 minutes before removal. Socket users were protected even while the package was live.

orderbook-backend

1337.1.0

by research13377

Live on npm

Blocked by Socket

This JavaScript file harvests local system information—including OS hostname, environment username, current working directory, platform, Node.js version, and timestamp—and immediately exfiltrates it to a hard-coded external server tergeiiqpuqpgzsencajoqbb38f415y0z[.]oast[.]fun via three parallel channels: 1) an HTTP GET to http://tergeiiqpuqpgzsencajoqbb38f415y0z[.]oast[.]fun/get with base64-encoded h (hostname), u (user), and p (pwd) parameters; 2) an HTTP POST to http://tergeiiqpuqpgzsencajoqbb38f415y0z[.]oast[.]fun/post sending the full JSON payload; and 3) a DNS lookup on a subdomain composed of truncated base64-encoded user and hostname under tergeiiqpuqpgzsencajoqbb38f415y0z[.]oast[.]fun. All errors and network callbacks are silently swallowed, there is no user consent or opt-out, and the redundant transports ensure data leaves the host even if some channels are blocked.

bfx-facs-lru

99.10.10

Removed from npm

Blocked by Socket

The code engages in potentially malicious behavior by collecting sensitive system information and sending it to a remote server without clear user consent. The hard-coded domain, data obfuscation, and lack of transparency raise significant privacy and security concerns. The risk score is high due to the invasive nature of the code.

Live on npm for 59 minutes before removal. Socket users were protected even while the package was live.

pyhtools

1.1.0

Live on pypi

Blocked by Socket

This script implements an active man-in-the-middle that detects HTTP requests for .exe files and replaces server responses with a 301 redirect to a hardcoded executable URL. That behavior constitutes unauthorized traffic tampering and supply-chain manipulation when used without explicit consent. It requires root and modifies iptables, making it high-risk. While not performing exfiltration or persistence, it effectively redirects downloads to a possibly malicious binary and can break network or firewall configuration when stopped (it flushes all iptables rules). Treat this code as malicious in network contexts; do not run on production or untrusted networks.

inc

0.1.10

Live on pypi

Blocked by Socket

The code fragment exhibits high-risk behavior primarily due to enabling passwordless sudo for the wheel group on macOS and modifying system-wide sudoers without robust validation or consent beyond a prompt. The combination of unvalidated user input for Git configuration and dependency on external scripts further increases trust and supply-chain concerns. While not actively malicious in terms of data theft, its privilege-escalation mechanism represents a significant security risk and could be misused if compromised or tampered with. This warrants strong caution, removal of passwordless sudo logic, input validation, and safer sudoers handling (e.g., visudo checks) before use in any environment.

rqeactjs

1.1.2

by nepz

Live on npm

Blocked by Socket

This code is malicious. It performs unauthorized data exfiltration of system network interface IP addresses and hostname to an attacker-controlled Discord webhook. This behavior constitutes malware and poses a high security risk. The code is clear and not obfuscated, but the embedded webhook and silent transmission of system information without user consent make it dangerous and privacy-invasive.

bane

4.7.9

Live on pypi

Blocked by Socket

This module is a network scanner and brute-forcing tool that actively attempts to discover and compromise remote hosts, harvests credentials to disk, and integrates with exploit/payload modules and a telnet bot mode. The behavior is consistent with malicious tooling (worm/botnet propagation and credential theft). It should not be used in benign production environments and is a high-security risk. The code contains bugs (missing 'found' attribute) and uses noisy exception suppression, but these do not mitigate the malicious intent. Treat this package as malicious and remove or block it.

mtsm

0.0.75

Live on pypi

Blocked by Socket

This settings module contains multiple insecure configurations and several hardcoded secrets and keys that create a substantial supply‑chain and operational security risk if this repository is public or shared. There is no direct evidence of active malware in the code fragment itself, but the committed secrets and permissive production flags (DEBUG, ALLOWED_HOSTS, CORS allow all) materially increase risk of compromise and misuse. Treat this as high security risk: remove secrets from source control, rotate exposed credentials, tighten hosts/CORS/DEBUG, and audit dependent apps and configured endpoints.

com.unity.ai.inference

10.0.1

by harsh7k

Live on npm

Blocked by Socket

This preinstall script performs unauthorized data collection and exfiltration: it executes system commands to read potentially sensitive information (e.g., systeminfo or /etc/passwd) and POSTs the results to an external server during npm install. This is high-risk malicious behavior (data exfiltration/telemetry). Do not install this package in production or on sensitive systems; inspect and remove such scripts and block the destination host.

abstract-database

0.0.1.11

Live on pypi

Blocked by Socket

The code in the flagged file explicitly reads a local file from a fixed system path (/home/joben/Desktop/testsol/abstract_it.py) and transmits its contents via an HTTP request to a Discord webhook. The target URL is hardcoded as https://discordapp[.]com/api/webhooks/1278595755812327424/3xvzS30Bx8bOhooNJeY9gnYj2KjFb2-ZfV2rHpBdkS71tuibNeu56_mRFE38MrmQRa_j, with the embedded token included in the URL. This behavior is characteristic of malware designed for data exfiltration, as it automatically sends potentially sensitive file content to an external service without user consent.

fb-login-brute

1.0.1

Live on pypi

Blocked by Socket

This module is an explicit brute-force attack tool targeting Facebook login/recovery endpoints. It contains active evasion techniques (user-agent rotation, backoff loops), disables SSL verification when proxies are used (insecure), and prints sensitive cookies to stdout. The code should be considered malicious in intent and high risk: it facilitates unauthorized access and credential theft. Use or inclusion of this code in a repository or supply chain is a serious security and legal concern.

watchman-search-ui

1.0.0

by inventashif

Removed from npm

Blocked by Socket

This script is highly suspicious, collects sensitive information, and establishes a backdoor, thus posing a significant security risk.

Live on npm for 3 days, 12 hours and 30 minutes before removal. Socket users were protected even while the package was live.

nvrtool

1.0.2

by label, NvrTool

Live on nuget

Blocked by Socket

This assembly includes a highly obfuscated runtime loader/packer capable of decrypting embedded payloads, allocating executable memory, creating delegates from raw pointers, and hooking/intercepting JIT/native code paths. Static constructors call the obfuscated bootstrap, so merely loading the assembly triggers this behavior. These are strong indicators of malicious loader functionality (runtime code injection, dynamic payload execution, anti-analysis checks). Even though the library also contains benign-looking DVR helper classes, the embedded loader behavior is high-risk for supply-chain abuse: it can execute arbitrary code inside the host process and evade static inspection. I recommend treating this package as malicious/potentially unwanted: do not use it in production, perform dynamic analysis in an isolated environment if deeper investigation is needed, and obtain a clean, non-obfuscated upstream library for DVR functionality.

socket.oi

4.6.13

by xwlazssz

Removed from npm

Blocked by Socket

The code contains malicious behavior aimed at encrypting files in critical directories and potentially creating a ransom note. This indicates ransomware-like behavior.

Live on npm for 11 minutes before removal. Socket users were protected even while the package was live.

graphscript-node

0.2.88

by moothyknight

Live on npm

Blocked by Socket

This module is highly security-sensitive and strongly indicative of a runtime code injection capability. It explicitly evaluates received JavaScript source via eval in receiveClass and also supports reconstructing and installing functions/classes from text (parseFunctionFromText) while transporting code strings across Workers/WebSockets/custom run channels. It can additionally mutate globalThis and internal graph state, significantly increasing blast radius. Use only with strict trust boundaries (e.g., fully trusted callers/peers) and ideally remove/disable eval-like behavior; otherwise treat as a potential backdoor/supply-chain injection vector.

vite-plugin-bomb-extend

2.0.2

by xuxingfeng

Live on npm

Blocked by Socket

The code is intentionally malicious and poses a significant security risk to any application using this package. It should be removed immediately and not used in any production environment.

anycodes-python-ui

0.0.7

Live on pypi

Blocked by Socket

This module is a program tracer designed to collect and upload detailed runtime state (locals, globals, stdout, exceptions) to a remote server (api.anycodes.cn). The behaviour constitutes sensitive data exfiltration risk: it can leak secrets present in program state. The global disabling of TLS verification and presence of disable_security_checks=True increase risk. If you do not explicitly trust this uploader and the remote endpoint, do not run it in environments with sensitive data (e.g., production, CI, containers with credentials). The code should be treated as risky for supply-chain usage unless its network upload is disabled or restricted to trusted networks/endpoints.

python-datetil

1.1.2

Removed from pypi

Blocked by Socket

Despite claims of being educational/demo code, this represents dangerous backdoor functionality that should not be present in production dependencies. Contains a reverse shell backdoor implementation that establishes a TCP connection to 127[.]0[.]0[.]1 on port 4444, redirects stdin/stdout/stderr to the socket using os.dup2(), and spawns an interactive /bin/sh shell via pty.spawn(). This classic backdoor pattern enables remote command execution for any listener on the target address. While the code targets localhost and contains a syntax error (missing closing parenthesis), the malicious capability is clear and represents a high-risk supply chain compromise. The code also includes environment fingerprinting that collects OS, username, and hostname information.

Live on pypi for 2 hours and 59 minutes before removal. Socket users were protected even while the package was live.

codeception/codeception

2.1.2

Live on composer

Blocked by Socket

This composer.json fragment registers lifecycle scripts that will run automatically and include a destructive shell command `rm -rf vendor` which will delete the project's vendor directory after installing/updating — a clear sabotage pattern. The Installer::copyC3ToRoot call could also perform arbitrary filesystem operations depending on the dependency's code. Overall this is likely malicious or at least highly dangerous for project integrity and should not be trusted or executed without inspection. Remove or disable these scripts and audit the referenced package before use.

lalalmenu2021

0.0.4

by lalala2021

Live on npm

Blocked by Socket

The code contains significant security risks due to hardcoded credentials and insecure transmission over HTTP to a suspicious external domain, which may lead to credential compromise and data leakage. While no direct malware payloads are detected, the behavior strongly suggests potential data exfiltration. The code is not obfuscated and is straightforward. It is recommended to remove hardcoded credentials, use HTTPS, validate inputs, and verify the trustworthiness of external domains to mitigate security risks.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Git dependency

GitHub dependency

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

Telemetry

Protestware or potentially unwanted behavior

Unstable ownership

55 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a Demo

Questions? Call us at (844) SOCKET-0

Read the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles