Launch Week Day 5: Introducing Reachability for PHP.Learn More
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.5

We protect you from vulnerable and malicious packages

ailever

0.2.393

Live on pypi

Blocked by Socket

The code exhibits a dangerous remote code execution pattern: it downloads and immediately runs a remote Python payload without integrity checks, sandboxing, or input validation. This creates a severe supply-chain and runtime security risk. Recommended mitigations include removing dynamic downloads, validating payloads with cryptographic hashes or signatures, using safe subprocess invocations with argument lists, and implementing strict input sanitization. If remote functionality must remain, switch to a trusted-internal mechanism (e.g., plugin architecture with signed components, offline verification) and add robust error handling and logging.

nash-cli

0.1.3

Live on cargo

Blocked by Socket

The code introduces potential supply-chain and remote execution risks by automatically downloading and executing an external binary without verification or explicit user consent. While it may be intended for a legitimate auto-update feature, the lack of integrity verification and user-specified approval creates a plausible security vulnerability and potential backdoor pathway if the downloaded artifact is tampered with or sourced from an untrusted location.

myajaxcall

2.0.0

by tlehmann

Live on npm

Blocked by Socket

The code fundamentally enables remote code execution by fetching remote HTML/scripts and evaluating them without sanitization or origin enforcement. This creates high risk for supply-chain abuse, data exfiltration, and DOM-based attacks. While the module could be used for legitimate dynamic loading, its current implementation is unsafe and should be replaced with strict content security policy enforcement, input validation, and avoidance of eval. If remote loading is required, it must be sandboxed, whitelisted to trusted origins, and use safe alternative methods (e.g., dynamic import or CSP-restricted script execution).

tensorkube

0.0.76

Live on pypi

Blocked by Socket

This template itself is not obfuscated and contains no direct data-exfiltration code, but it provisions a Lambda with broad, potentially destructive privileges (IAM deletion/modify, ECR deletion, CloudFormation DeleteStack, EFS deletion, S3 delete, EC2 security group deletion). The template configures automatic invocation of that Lambda to delete ECR images as part of stack operations. If the referenced Lambda image is untrusted or compromised, these permissions could be abused to cause substantial account-wide damage. Recommend treating this as high-risk from a privilege perspective: audit and pin the Lambda image, restrict IAM policies to least privilege (avoid Resource:"*"), and require manual approval for destructive teardown actions.

fsociety

3.1.6

Live on pypi

Blocked by Socket

This wrapper class itself is small and not obfuscated, but it presents two high-risk behaviors: (1) it executes third-party code from a GitHub repo with no integrity checks or sandboxing (supply-chain risk), and (2) it directly interpolates untrusted user input into an os.system shell command (command-injection vulnerability). Combined with the explicit description advertising credential-reuse attacks, the module is a facilitator for abusive activity and should be treated as malicious/abusive tooling. Do not run or install this package in trusted environments; if analysis is required, perform it in an isolated, controlled environment with network restrictions and inspect the upstream repository first.

github.com/bishopfox/sliver

v1.5.40-0.20230712154933-a2c326361973

Live on go

Blocked by Socket

This file is a straightforward implementation of a stager generator front-end for the Sliver framework: it collects user input, optionally resolves hostnames interactively, and requests a Metasploit-based stager from an RPC backend, then writes or displays the result. There is no evidence in this snippet of obfuscation, credential theft, or hidden backdoors; however, its intended functionality is offensive (implant/payload generation) and therefore poses a significant security risk in most benign environments. Treat inclusion of this component in a supply chain with caution: it's designed to produce executable implants and depends on a backend that likely executes msfvenom/msfconsole.

discord.js-selfbot-v32

11.5.1

by pandalofy

Removed from npm

Blocked by Socket

The code poses a high security risk due to unauthorized data access, network communication, and potential system manipulation. The lack of detailed and clear reports hinders a comprehensive security assessment. Malware score: 0.8, Obfuscated score: 0.6, Security risk score: 0.8

Live on npm for 30 minutes before removal. Socket users were protected even while the package was live.

thispackagedoesnotexist

0.1.7

Live on pypi

Blocked by Socket

This module harvests sensitive browser artifacts (history, saved logins, cookies, extension metadata) and includes logic to exfiltrate that data via client.send_message. It forcibly terminates browser processes and launches a headless Chrome instance with remote debugging to extract cookies — an active technique used to obtain session tokens. These behaviors are consistent with credential harvesting and data exfiltration. Treat this code as malicious or at minimum highly privacy-invasive and unsuitable for use in trusted environments without strong justification and safeguards.

kevinrabun/judges

cde6aef6d38362f4544a024892677da5c0297ff3

Live on actions

Blocked by Socket

This function is critically insecure: it reads a file determined by caller input and directly passes its contents to eval(), enabling arbitrary code execution and potential path traversal. Treat as high security risk. Replace eval with safe deserialization (ast.literal_eval or json), validate and normalize the filename (reject path separators, use a whitelist), add access controls and exception handling. If arbitrary execution is required, implement a secure sandbox and rigorous input validation.

lexicalutils

99.9.9

by lexical123

Removed from npm

Blocked by Socket

This script collects information like hostname, platform, user info and current path, then sends it to a remote server. Additionally, it writes a local file named 'locatethisfileforpoc' with the content 'execution achieved'.

Live on npm for 17 hours and 19 minutes before removal. Socket users were protected even while the package was live.

realtime-translation-package

6.5.8

by taka14182

Removed from npm

Blocked by Socket

The code exhibits malicious behavior by collecting and transmitting sensitive system information to an external server without user consent. This poses a high security risk and potential for data theft.

Live on npm for 9 days, 16 hours and 11 minutes before removal. Socket users were protected even while the package was live.

pupeteer-cluster-helper

1.0.1

by 4skme.com

Live on npm

Blocked by Socket

This module is intentionally obfuscated and contains a clear data-exfiltration capability: it will send any caller-provided payload to a hidden remote SERVER_URL via axios with no validation. The obfuscation and runtime decoding strongly increase suspicion of malicious intent. Action recommended: treat as untrusted/malicious — remove or isolate the package, deobfuscate the strings in a safe sandbox to identify the target endpoint and intent, and audit any callers that may pass sensitive data to page_loaded. If this package is present in a supply chain, consider rotating secrets that may have been exposed and performing a wider dependency audit.

chainflow

5.0.3

by troll1234

Removed from npm

Blocked by Socket

This install script runs a program and then deletes a file. While the behavior itself may not be inherently malicious, it is potentially risky as it modifies the file system during the installation process.

Live on npm for 4 days, 18 hours and 37 minutes before removal. Socket users were protected even while the package was live.

my-lodop-print-designer

1.3.93

by mydujia

Live on npm

Blocked by Socket

This module exhibits strong malicious-capability indicators from a supply-chain/security perspective: it can receive network data over WebSocket and execute it directly via eval(e.data), and it can dynamically inject and execute additional remote scripts via HTTP-based URL constants as a fallback. It also includes higher-risk injection surfaces in the printing pipeline (notably unescaped embedding of an image URL into HTML) and enables HTML injection in UI dialogs (dangerouslyUseHTMLString). Even if intended for legitimate printing, the eval+remote-load combination creates a critical remote code execution risk if endpoints/payloads are compromised or influenced.

robotframework-historic2

0.0.1

Live on pypi

Blocked by Socket

This module performs high-risk privileged database operations: it creates a global 'superuser' account with a hardcoded weak password ('passw0rd') and grants ALL PRIVILEGES WITH GRANT OPTION for both localhost and '%' (remote) access, then creates a database and tables. This is effectively a backdoor and a severe supply-chain/security risk. Do not use this code in production or as part of a third-party dependency. Recommended actions: remove automated creation of privileged accounts, require secure, auditable credential provisioning (not hardcoded), restrict host access, log to secure sinks, fix the syntax bug, and require code review before any privilege-altering DB operations.

github.com/weaveworks/weave

v1.0.2-0.20150705181902-098fc8182509

Live on go

Blocked by Socket

This module is a high-risk runtime packer/dropper: it embeds an encrypted payload, decrypts it using a user-supplied passphrase, writes the result to `bin/do-setup-circleci-secrets`, and immediately executes it. Because there is no integrity/authenticity validation of the decrypted artifact and the executed code is not shown here, the module should be treated as potentially malicious until the decrypted `bin/do-setup-circleci-secrets` content is inspected and validated in a safe environment.

cdnhost

0.5.7

by fluke103

Live on npm

Blocked by Socket

This client-side JavaScript injects CSS/HTML to overlay a full-page clickable DIV (#s2) and binds scroll-to-bottom, any keypress, and back-button (history.pushState/onpopstate) events to automatically open two new browser tabs to hard-coded external domains. On desktop it selects from newsfactory[.]iwinv[.]net and seekr[.]kr/recent[.]php; on mobile it selects from newsfactory[.]iwinv[.]net, school[.]iwinv[.]net/recent[.]php, ruliweb[.]iwinv[.]net/recent[.]php, and instiz[.]iwinv[.]net/recent[.]php. It also manipulates history to trap back navigation and programmatically hides or alters page elements to prevent user dismissal. This intrusive, unsolicited redirection behavior is characteristic of adware/malicious redirect malware.

calypso-e2e

1003.0.0

by k4r1it0

Removed from npm

Blocked by Socket

The code collects and sends potentially sensitive system data to a remote server without user consent, which is indicative of malicious behavior. This poses a significant security risk due to unauthorized data transmission.

Live on npm for 1 hour and 2 minutes before removal. Socket users were protected even while the package was live.

kskit

0.0.10

Removed from pypi

Blocked by Socket

Code contains significant security vulnerabilities including command injection, arbitrary file download, and potential path traversal. While not malicious in intent, the unsafe practices create serious security risks.

Live on pypi for 2 hours and 21 minutes before removal. Socket users were protected even while the package was live.

tiny-model-update

1.16.6

Live on npm

Blocked by Socket

This code fragment actively exfiltrates evidence of Discord token harvesting (including host identification and token counts) to a Telegram chat, then attempts to hide traces by stopping the bot, destroying standard streams, and exiting. These behaviors are characteristic of credential-stealing malware. Treat the package as malicious: do not run it, audit remaining repository files (especially modules providing Telegram credentials and token collection logic), and rotate any potentially compromised credentials on affected hosts.

github.com/bettercap/bettercap/v2

v2.41.0

Live on go

Blocked by Socket

The code poses a high risk due to its ability to read arbitrary files from the client, which could lead to sensitive data exposure. The code's purpose is malicious, and its behavior could be considered malware.

arc-offsec-custom-library6

1.1.0

by drupath2244

Removed from npm

Blocked by Socket

This code implements a reverse shell backdoor that spawns a local shell process (/bin/sh) and establishes a TCP connection to a remote server at 0[.]tcp[.]in[.]ngrok[.]io on port 14832. Once connected, it creates bidirectional pipes between the shell and the network socket - piping remote commands to the shell's stdin and sending the shell's stdout/stderr back to the attacker. This provides unrestricted remote command execution capabilities on the host system. The code includes an empty error handler to suppress connection failures, likely to avoid detection. There are no authentication mechanisms, encryption, or user consent - this is a clear backdoor designed for unauthorized remote access and poses a critical security threat.

Live on npm for 3 days, 10 hours and 11 minutes before removal. Socket users were protected even while the package was live.

@phygrid/device-phyos

4.3.37-dev

by hassellof

Live on npm

Blocked by Socket

This module performs actions consistent with installing and activating a remote SSH access channel: it writes an SSH public key into authorized_keys and proxies the local SSH port over a WebSocket to a remote endpoint using a supplied auth token. That behavior can be used as a stealthy backdoor or remote-management agent. If used with malicious intent (or without proper authorization and safeguards), it grants remote access and facilitates credential-based access by an external controller. If you did not expect code to modify authorized_keys or open outbound tunnels to arbitrary URLs, consider this high-risk and remove or audit its use. If legitimate, require strict review, allowlisting of destination URLs, key handling policies, and safer key management (append-only with backups, owner checks, explicit user consent).

reverse-stu-allversions

1.0.35

by reverse-stu

Live on npm

Blocked by Socket

This module is strongly consistent with a packed/obfuscated JavaScript loader (JiaMi-style traits): it decrypts embedded content at runtime using a custom base64/RC4-like XOR transform and then dynamically executes the decrypted result via the Function constructor. It also tampers with console output and uses environment/regex gating to evade analysis. While explicit exfiltration/actions are not observable in the visible fragment, the decode-and-execute mechanism makes the supply-chain risk high until the fully decoded payload is safely inspected.

liberu-crm/crm-laravel

dev-copilot/fix-tests-and-logic

Live on composer

Blocked by Socket

The codebase functions as a powerful web-based provisioning controller capable of end-to-end setup tasks, including dependency installation, database operations, module management, and dynamic user creation. While this can simplify deployment, it introduces substantial risk if exposed to untrusted users or if credentials leak. The legitimate risk stems from: dynamic code generation, extensive CLI execution driven by inputs, external installer downloads, and environment/config manipulation. Recommend tightening access, validating inputs, hardening or removing dynamic script generation, implementing least-privilege execution, adding thorough logging/auditing, and removing non-essential network fetches to reduce supply-chain risk.

ailever

0.2.393

Live on pypi

Blocked by Socket

The code exhibits a dangerous remote code execution pattern: it downloads and immediately runs a remote Python payload without integrity checks, sandboxing, or input validation. This creates a severe supply-chain and runtime security risk. Recommended mitigations include removing dynamic downloads, validating payloads with cryptographic hashes or signatures, using safe subprocess invocations with argument lists, and implementing strict input sanitization. If remote functionality must remain, switch to a trusted-internal mechanism (e.g., plugin architecture with signed components, offline verification) and add robust error handling and logging.

nash-cli

0.1.3

Live on cargo

Blocked by Socket

The code introduces potential supply-chain and remote execution risks by automatically downloading and executing an external binary without verification or explicit user consent. While it may be intended for a legitimate auto-update feature, the lack of integrity verification and user-specified approval creates a plausible security vulnerability and potential backdoor pathway if the downloaded artifact is tampered with or sourced from an untrusted location.

myajaxcall

2.0.0

by tlehmann

Live on npm

Blocked by Socket

The code fundamentally enables remote code execution by fetching remote HTML/scripts and evaluating them without sanitization or origin enforcement. This creates high risk for supply-chain abuse, data exfiltration, and DOM-based attacks. While the module could be used for legitimate dynamic loading, its current implementation is unsafe and should be replaced with strict content security policy enforcement, input validation, and avoidance of eval. If remote loading is required, it must be sandboxed, whitelisted to trusted origins, and use safe alternative methods (e.g., dynamic import or CSP-restricted script execution).

tensorkube

0.0.76

Live on pypi

Blocked by Socket

This template itself is not obfuscated and contains no direct data-exfiltration code, but it provisions a Lambda with broad, potentially destructive privileges (IAM deletion/modify, ECR deletion, CloudFormation DeleteStack, EFS deletion, S3 delete, EC2 security group deletion). The template configures automatic invocation of that Lambda to delete ECR images as part of stack operations. If the referenced Lambda image is untrusted or compromised, these permissions could be abused to cause substantial account-wide damage. Recommend treating this as high-risk from a privilege perspective: audit and pin the Lambda image, restrict IAM policies to least privilege (avoid Resource:"*"), and require manual approval for destructive teardown actions.

fsociety

3.1.6

Live on pypi

Blocked by Socket

This wrapper class itself is small and not obfuscated, but it presents two high-risk behaviors: (1) it executes third-party code from a GitHub repo with no integrity checks or sandboxing (supply-chain risk), and (2) it directly interpolates untrusted user input into an os.system shell command (command-injection vulnerability). Combined with the explicit description advertising credential-reuse attacks, the module is a facilitator for abusive activity and should be treated as malicious/abusive tooling. Do not run or install this package in trusted environments; if analysis is required, perform it in an isolated, controlled environment with network restrictions and inspect the upstream repository first.

github.com/bishopfox/sliver

v1.5.40-0.20230712154933-a2c326361973

Live on go

Blocked by Socket

This file is a straightforward implementation of a stager generator front-end for the Sliver framework: it collects user input, optionally resolves hostnames interactively, and requests a Metasploit-based stager from an RPC backend, then writes or displays the result. There is no evidence in this snippet of obfuscation, credential theft, or hidden backdoors; however, its intended functionality is offensive (implant/payload generation) and therefore poses a significant security risk in most benign environments. Treat inclusion of this component in a supply chain with caution: it's designed to produce executable implants and depends on a backend that likely executes msfvenom/msfconsole.

discord.js-selfbot-v32

11.5.1

by pandalofy

Removed from npm

Blocked by Socket

The code poses a high security risk due to unauthorized data access, network communication, and potential system manipulation. The lack of detailed and clear reports hinders a comprehensive security assessment. Malware score: 0.8, Obfuscated score: 0.6, Security risk score: 0.8

Live on npm for 30 minutes before removal. Socket users were protected even while the package was live.

thispackagedoesnotexist

0.1.7

Live on pypi

Blocked by Socket

This module harvests sensitive browser artifacts (history, saved logins, cookies, extension metadata) and includes logic to exfiltrate that data via client.send_message. It forcibly terminates browser processes and launches a headless Chrome instance with remote debugging to extract cookies — an active technique used to obtain session tokens. These behaviors are consistent with credential harvesting and data exfiltration. Treat this code as malicious or at minimum highly privacy-invasive and unsuitable for use in trusted environments without strong justification and safeguards.

kevinrabun/judges

cde6aef6d38362f4544a024892677da5c0297ff3

Live on actions

Blocked by Socket

This function is critically insecure: it reads a file determined by caller input and directly passes its contents to eval(), enabling arbitrary code execution and potential path traversal. Treat as high security risk. Replace eval with safe deserialization (ast.literal_eval or json), validate and normalize the filename (reject path separators, use a whitelist), add access controls and exception handling. If arbitrary execution is required, implement a secure sandbox and rigorous input validation.

lexicalutils

99.9.9

by lexical123

Removed from npm

Blocked by Socket

This script collects information like hostname, platform, user info and current path, then sends it to a remote server. Additionally, it writes a local file named 'locatethisfileforpoc' with the content 'execution achieved'.

Live on npm for 17 hours and 19 minutes before removal. Socket users were protected even while the package was live.

realtime-translation-package

6.5.8

by taka14182

Removed from npm

Blocked by Socket

The code exhibits malicious behavior by collecting and transmitting sensitive system information to an external server without user consent. This poses a high security risk and potential for data theft.

Live on npm for 9 days, 16 hours and 11 minutes before removal. Socket users were protected even while the package was live.

pupeteer-cluster-helper

1.0.1

by 4skme.com

Live on npm

Blocked by Socket

This module is intentionally obfuscated and contains a clear data-exfiltration capability: it will send any caller-provided payload to a hidden remote SERVER_URL via axios with no validation. The obfuscation and runtime decoding strongly increase suspicion of malicious intent. Action recommended: treat as untrusted/malicious — remove or isolate the package, deobfuscate the strings in a safe sandbox to identify the target endpoint and intent, and audit any callers that may pass sensitive data to page_loaded. If this package is present in a supply chain, consider rotating secrets that may have been exposed and performing a wider dependency audit.

chainflow

5.0.3

by troll1234

Removed from npm

Blocked by Socket

This install script runs a program and then deletes a file. While the behavior itself may not be inherently malicious, it is potentially risky as it modifies the file system during the installation process.

Live on npm for 4 days, 18 hours and 37 minutes before removal. Socket users were protected even while the package was live.

my-lodop-print-designer

1.3.93

by mydujia

Live on npm

Blocked by Socket

This module exhibits strong malicious-capability indicators from a supply-chain/security perspective: it can receive network data over WebSocket and execute it directly via eval(e.data), and it can dynamically inject and execute additional remote scripts via HTTP-based URL constants as a fallback. It also includes higher-risk injection surfaces in the printing pipeline (notably unescaped embedding of an image URL into HTML) and enables HTML injection in UI dialogs (dangerouslyUseHTMLString). Even if intended for legitimate printing, the eval+remote-load combination creates a critical remote code execution risk if endpoints/payloads are compromised or influenced.

robotframework-historic2

0.0.1

Live on pypi

Blocked by Socket

This module performs high-risk privileged database operations: it creates a global 'superuser' account with a hardcoded weak password ('passw0rd') and grants ALL PRIVILEGES WITH GRANT OPTION for both localhost and '%' (remote) access, then creates a database and tables. This is effectively a backdoor and a severe supply-chain/security risk. Do not use this code in production or as part of a third-party dependency. Recommended actions: remove automated creation of privileged accounts, require secure, auditable credential provisioning (not hardcoded), restrict host access, log to secure sinks, fix the syntax bug, and require code review before any privilege-altering DB operations.

github.com/weaveworks/weave

v1.0.2-0.20150705181902-098fc8182509

Live on go

Blocked by Socket

This module is a high-risk runtime packer/dropper: it embeds an encrypted payload, decrypts it using a user-supplied passphrase, writes the result to `bin/do-setup-circleci-secrets`, and immediately executes it. Because there is no integrity/authenticity validation of the decrypted artifact and the executed code is not shown here, the module should be treated as potentially malicious until the decrypted `bin/do-setup-circleci-secrets` content is inspected and validated in a safe environment.

cdnhost

0.5.7

by fluke103

Live on npm

Blocked by Socket

This client-side JavaScript injects CSS/HTML to overlay a full-page clickable DIV (#s2) and binds scroll-to-bottom, any keypress, and back-button (history.pushState/onpopstate) events to automatically open two new browser tabs to hard-coded external domains. On desktop it selects from newsfactory[.]iwinv[.]net and seekr[.]kr/recent[.]php; on mobile it selects from newsfactory[.]iwinv[.]net, school[.]iwinv[.]net/recent[.]php, ruliweb[.]iwinv[.]net/recent[.]php, and instiz[.]iwinv[.]net/recent[.]php. It also manipulates history to trap back navigation and programmatically hides or alters page elements to prevent user dismissal. This intrusive, unsolicited redirection behavior is characteristic of adware/malicious redirect malware.

calypso-e2e

1003.0.0

by k4r1it0

Removed from npm

Blocked by Socket

The code collects and sends potentially sensitive system data to a remote server without user consent, which is indicative of malicious behavior. This poses a significant security risk due to unauthorized data transmission.

Live on npm for 1 hour and 2 minutes before removal. Socket users were protected even while the package was live.

kskit

0.0.10

Removed from pypi

Blocked by Socket

Code contains significant security vulnerabilities including command injection, arbitrary file download, and potential path traversal. While not malicious in intent, the unsafe practices create serious security risks.

Live on pypi for 2 hours and 21 minutes before removal. Socket users were protected even while the package was live.

tiny-model-update

1.16.6

Live on npm

Blocked by Socket

This code fragment actively exfiltrates evidence of Discord token harvesting (including host identification and token counts) to a Telegram chat, then attempts to hide traces by stopping the bot, destroying standard streams, and exiting. These behaviors are characteristic of credential-stealing malware. Treat the package as malicious: do not run it, audit remaining repository files (especially modules providing Telegram credentials and token collection logic), and rotate any potentially compromised credentials on affected hosts.

github.com/bettercap/bettercap/v2

v2.41.0

Live on go

Blocked by Socket

The code poses a high risk due to its ability to read arbitrary files from the client, which could lead to sensitive data exposure. The code's purpose is malicious, and its behavior could be considered malware.

arc-offsec-custom-library6

1.1.0

by drupath2244

Removed from npm

Blocked by Socket

This code implements a reverse shell backdoor that spawns a local shell process (/bin/sh) and establishes a TCP connection to a remote server at 0[.]tcp[.]in[.]ngrok[.]io on port 14832. Once connected, it creates bidirectional pipes between the shell and the network socket - piping remote commands to the shell's stdin and sending the shell's stdout/stderr back to the attacker. This provides unrestricted remote command execution capabilities on the host system. The code includes an empty error handler to suppress connection failures, likely to avoid detection. There are no authentication mechanisms, encryption, or user consent - this is a clear backdoor designed for unauthorized remote access and poses a critical security threat.

Live on npm for 3 days, 10 hours and 11 minutes before removal. Socket users were protected even while the package was live.

@phygrid/device-phyos

4.3.37-dev

by hassellof

Live on npm

Blocked by Socket

This module performs actions consistent with installing and activating a remote SSH access channel: it writes an SSH public key into authorized_keys and proxies the local SSH port over a WebSocket to a remote endpoint using a supplied auth token. That behavior can be used as a stealthy backdoor or remote-management agent. If used with malicious intent (or without proper authorization and safeguards), it grants remote access and facilitates credential-based access by an external controller. If you did not expect code to modify authorized_keys or open outbound tunnels to arbitrary URLs, consider this high-risk and remove or audit its use. If legitimate, require strict review, allowlisting of destination URLs, key handling policies, and safer key management (append-only with backups, owner checks, explicit user consent).

reverse-stu-allversions

1.0.35

by reverse-stu

Live on npm

Blocked by Socket

This module is strongly consistent with a packed/obfuscated JavaScript loader (JiaMi-style traits): it decrypts embedded content at runtime using a custom base64/RC4-like XOR transform and then dynamically executes the decrypted result via the Function constructor. It also tampers with console output and uses environment/regex gating to evade analysis. While explicit exfiltration/actions are not observable in the visible fragment, the decode-and-execute mechanism makes the supply-chain risk high until the fully decoded payload is safely inspected.

liberu-crm/crm-laravel

dev-copilot/fix-tests-and-logic

Live on composer

Blocked by Socket

The codebase functions as a powerful web-based provisioning controller capable of end-to-end setup tasks, including dependency installation, database operations, module management, and dynamic user creation. While this can simplify deployment, it introduces substantial risk if exposed to untrusted users or if credentials leak. The legitimate risk stems from: dynamic code generation, extensive CLI execution driven by inputs, external installer downloads, and environment/config manipulation. Recommend tightening access, validating inputs, hardening or removing dynamic script generation, implementing least-privilege execution, adding thorough logging/auditing, and removing non-essential network fetches to reduce supply-chain risk.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Git dependency

GitHub dependency

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

Telemetry

Protestware or potentially unwanted behavior

Unstable ownership

55 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a Demo

Questions? Call us at (844) SOCKET-0

Read the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles