Launch Week Day 5: Introducing Reachability for PHP.Learn More
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.5

We protect you from vulnerable and malicious packages

cl-lite

1.0.955

by michael_tian

Live on npm

Blocked by Socket

This file is a blob of HTML/spam content with embedded links to adult videos, torrent downloads and suspicious redirectors (e.g. https://2023[.]redircdn[.]com/?…, http://rmdown[.]com/link[.]php?hash=…, http://data[.]down2048[.]com/list[.]php?…), plus numerous third-party image URLs. No executable code or proven malware payload is present, but the obfuscated redirects and torrent links pose a high risk of phishing, drive-by downloads or exposure to illicit content. Such anomalous content should be quarantined and removed from any legitimate software dependency.

@retail-core/rds

1.0.4

by retail-core

Live on npm

Blocked by Socket

The file collects host system details (hostname via os.hostname(), current user and UID via os.userInfo(), Windows admin status via child_process.execSync('net session') and domain info via systeminfo), then disables TLS certificate validation by setting process.env['NODE_TLS_REJECT_UNAUTHORIZED']=0. It builds and sends an HTTPS GET request containing the username, admin status, hostname and __dirname to a suspicious endpoint at eewq2suvescxne0e5cdqgj6nnet5hu[.]oastify[.]com, indicating unauthorized data exfiltration and malicious intent.

sl-abuse

1.4.5

Live on pypi

Blocked by Socket

This file implements straightforward data exfiltration: it solicits arbitrary input and forwards it to a fixed external WhatsApp number using hardcoded Twilio credentials. That combination constitutes a high security risk — credentials should be treated as compromised, rotated immediately, and removed from source control. The code should not be executed. There is no complex obfuscation or advanced malware behavior, but the practical effect is malicious (unauthorized data transmission and credential leakage). Remediation: remove credentials, use secure secret storage, require explicit destination confirmation, add input validation/consent and logging, and avoid os.system calls.

ws-api-typescript-infra

0.0.0

by dorem

Removed from npm

Blocked by Socket

The code exhibits behavior consistent with malicious activity, specifically data exfiltration via DNS queries.

Live on npm for 5 days, 3 hours and 41 minutes before removal. Socket users were protected even while the package was live.

package-inherit

0.1.4

by smaroop

Removed from npm

Blocked by Socket

The code is engaging in potentially malicious behavior by collecting and transmitting sensitive system information to an external server without user consent. The domain used is suspicious, indicating a high risk of data theft.

Live on npm for 8 days, 6 hours and 50 minutes before removal. Socket users were protected even while the package was live.

354766/inference-sh-9/skills/youtube-thumbnail-design/

f0e401f3b2a695ebbbdc7720b8a3c495713e2d0c

Live on socket

Blocked by Socket

[Skill Scanner] Pipe-to-shell or eval pattern detected All findings: [CRITICAL] command_injection: Pipe-to-shell or eval pattern detected (CI013) [AITech 9.1.4] [CRITICAL] command_injection: Natural language instruction to download and install from URL detected (CI009) [AITech 9.1.4] [CRITICAL] command_injection: Natural language instruction to download and install from URL detected (CI009) [AITech 9.1.4] This skill/instruction doc appears functionally legitimate and aligned with its stated purpose (YouTube thumbnail design using a remote inference CLI). However, it contains moderately high supply-chain risk patterns: a curl|sh installer that downloads and executes a CLI from inference.sh/dist.inference.sh, plus examples that send prompts and (potentially) images and authentication tokens to a third-party service. There are no hardcoded secrets or obfuscated code in the provided text. Recommend treating the installer pattern as risky: prefer pinned, auditable installs (manual checksum verification before execution), clear documentation on where credentials go, and least-privilege CLI invocation. Overall: no clear malware, but medium-to-high supply-chain/security risk due to download-and-execute and credential/ data-forwarding patterns. LLM verification: The SKILL.md is a benign thumbnail-design guide but instructs users to install and use a third-party CLI via a pipe-to-shell pattern and to authenticate that CLI. The immediate risks are supply-chain and credential exposure: executing a remote install script and sending prompts/files/credentials to external inference endpoints. There is no embedded malware in the text itself, but the recommended operational flow is high-risk. Recommendation: do not execute the pipe-to-shell installer without ind

winsystemshell

0.0.1

Live on pypi

Blocked by Socket

This module implements a named-pipe remote shell: it creates named pipes with an 'Everyone' security descriptor, waits for client connections, redirects stdio to the pipes, and execs a shell (cmd.exe by default). That gives any connected client interactive command execution on the host with no authentication. This is functionally a backdoor/remote shell and poses a high security risk; treat as malicious or potentially dangerous unless you can verify intended, secure use and restrict access.

filecat

2.2.3

by xiaobaidadada

Live on npm

Blocked by Socket

The fragment appears to implement a browser-based remote session/control surface that captures user input and forwards it to a remote host, with session lifecycle management and remote-render updates. While such functionality can be legitimate for authorized remote-management tools, the pattern poses data-exposure and credential-usage risks, especially given localStorage-based tokens and heavy obfuscation. Key risk mitigations include strict authentication/authorization, encrypted transport, explicit user consent, minimal token exposure, auditable telemetry, and a security review of the remote endpoints and dynamic module loading paths. Overall, this is a medium-to-high risk component in a supply chain context if not clearly sanctioned and properly secured.

admin10001

1.0.311

by rank121

Removed from npm

Blocked by Socket

This preinstall script is explicitly malicious. It tries to steal AWS IAM credentials and environment details, probes for Docker socket access, and establishes a reverse shell to an attacker-controlled host. Do not install this package. If it was installed on any system, assume compromise: disconnect affected hosts, rotate any exposed credentials (IAM keys, tokens), revoke suspected sessions/keys, inspect for persistence or other malicious artifacts, and perform a full incident response.

Live on npm for 2 hours and 50 minutes before removal. Socket users were protected even while the package was live.

github.com/openshift/origin

v0.0.0-20251125041922-0fed5582d8a6

Live on go

Blocked by Socket

High security concern: this module packages a dockercfg secret into a Docker image and includes a Ruby/Rack HTTP endpoint that can disclose arbitrary file contents by mapping URL paths to environment variables, including an ENV key that directly points to the embedded dockercfg. The image is then built and pushed to a registry, distributing the credential-leak/backdoor capability via the supply chain. Review/disable and investigate any downstream use of the produced artifact; treat as likely malicious even though direct external exfiltration is not shown in this snippet.

lg-rez

4.0.17.2

Live on pypi

Blocked by Socket

This module exposes critical remote execution capabilities via Discord commands. `/do` performs `exec()` on attacker-controlled input in a context containing `globals()` and live objects, then returns results and tracebacks to the user. `/shell` launches an interactive `RealShell` with the same powerful context. Additionally, `/panik` provides a direct kill-switch (`sys.exit()`), and `setup` can perform destructive admin operations (roles/channels/emojis/icon, including deleting channels). While intent may be “admin/debug,” the explicit primitives are backdoor-grade risks unless ironclad authorization is proven in the unseen decorators/handlers. Based on this fragment alone, treat the security risk as critical/unsafe.

ctf-payload

1.0.47

by duonghello

Live on npm

Blocked by Socket

This JavaScript is intentionally malicious. It actively probes for sensitive data using SQL-injection-style payloads, aggregates responses, and exfiltrates them by posting to a comment endpoint. It also redirects remote users to a localhost service to access internal-only functionality. Remove this code immediately, audit server endpoints ('/check-resolve', '/post-comment') and logs, verify database query handling for SQL injection, and search the codebase and dependencies for the source of this injected script.

serval-integrations-common-frontend

7.0.0

by hackerone0101

Live on npm

Blocked by Socket

The preinstall hook will execute index.js during npm install. That grants the package the ability to run arbitrary code on the host. Without inspecting index.js, this is potentially dangerous and should be treated as suspicious. Review the contents of index.js (and any files it loads or network endpoints it contacts) before installing, or avoid installing packages that require running preinstall scripts from untrusted sources.

featureform-enterprise

0.13.39rc0

Live on pypi

Blocked by Socket

This module contains a critical security risk: it compiles and execs arbitrary local and remote Python content without any integrity, authentication, sandboxing, or allow-listing. While the file itself is not obfuscated and contains no explicit hardcoded malware, the use of exec on untrusted input constitutes a high-probability supply-chain and arbitrary code execution vulnerability. Treat this as a high security risk; remediate by eliminating or strongly controlling exec-based execution.

pjfun

0.0.17

by lxc9349

Removed from npm

Blocked by Socket

The code is a webpack runtime bootstrap with obfuscation and an explicit publicPath pointing to an external CDN (https://unpkg.com/pjfun@0.0.17/). It also overrides console methods (log/trace/warn/etc.), likely to suppress or control logging. The runtime itself does not directly exfiltrate data or open a reverse shell in the shown fragment, but setting publicPath to a remote host is a notable supply-chain risk because additional chunks will be fetched from that remote location and executed. The code is obfuscated and contains anti-debugging/log-suppression behavior; this increases risk and warrants close review of any remotely-loaded modules. Recommend treating the external CDN URL as untrusted and auditing any loaded modules or changing publicPath to a trusted source.

Live on npm for 19 minutes before removal. Socket users were protected even while the package was live.

tagmyphotosblog

1.0.0

by test6uy767

Removed from npm

Blocked by Socket

The code is malicious as it collects and sends sensitive system data to a suspicious domain without user consent. This poses a high security risk due to potential data theft and privacy invasion.

Live on npm for 2 days, 8 hours and 13 minutes before removal. Socket users were protected even while the package was live.

doughnuts

4.9.0

Live on pypi

Blocked by Socket

This module implements reverse-shell/backdoor functionality that constructs and sends payloads (bash/python/php) to a target ip:port and attempts to execute them via get_system_code/send utilities. The behavior is malicious for general use and represents a high security risk in a dependency. The code also contains syntactic corruption which may indicate tampering or redaction but does not reduce the clear backdoor intent. Remove and investigate this package and any related packages from the same author/publisher unless its presence is explicitly authorized for controlled offensive security use.

gamspy-base

53.3.0

Live on pypi

Blocked by Socket

The provided code executes an unknown executable, which poses potential security risks. Further investigation into gmscvnnx.exe is necessary to determine its behavior and any associated risks.

bluelamp-ai

1.0.1

Live on pypi

Blocked by Socket

This file intentionally conceals and dynamically executes an embedded payload. The pattern (base64 + zlib + exec on import) is high-risk: it prevents static review and enables arbitrary code execution at import time. Treat the package as untrusted until the embedded payload is decompressed and analyzed in a safe sandbox. Immediate mitigation: do not import/run this module in production; extract and inspect the decompressed string in isolation.

smartchart

7.7

Live on pypi

Blocked by Socket

This file contains Python code that decodes base64-encoded data, decompresses it with LZMA, and then executes the resulting payload using the 'exec' function. This sequence is a common method of obfuscating unauthorized or malicious code to evade detection. No additional domains or IP addresses were identified in the code. The hidden payload’s purpose remains unclear without analyzing the decompressed content, but the combination of obfuscation and runtime execution indicates a high likelihood of malicious intent.

remotesystemlogger

1.0.1

Removed from pypi

Blocked by Socket

This code is malicious and implements credential harvesting: it reads AWS credentials from ~/.aws/credentials, encodes them, and exfiltrates them via HTTP GET requests to a hardcoded remote IP. The base64-encoded target strings and hardcoded IP indicate intent to hide behavior. Even though the snippet contains a syntax error that would prevent execution in its current form, the logic and network exfiltration are clear and dangerous. Treat this code as a high-risk backdoor and do not run or include it in dependencies.

Live on pypi for 3 days, 23 hours and 3 minutes before removal. Socket users were protected even while the package was live.

passagemath-standard

10.4.4

Removed from pypi

Blocked by Socket

This fragment implements an unrestricted evaluator for Python source that executes caller-provided code with the privileges of the host process. The fragment itself contains no embedded malicious payloads, but it creates a critical security boundary: if x can be influenced by untrusted actors, this is a direct remote code execution vector. Recommend: do not use with untrusted input. If dynamic evaluation is required, adopt strong sandboxing (separate process with least privileges, seccomp/containers, restricted builtins, explicit whitelist of allowed operations, time/memory limits) or use a safe domain-specific evaluator rather than exec/eval on raw Python source.

Live on pypi for 16 hours and 32 minutes before removal. Socket users were protected even while the package was live.

directory-obfuscator

1.0.2

by dpm97

Removed from npm

Blocked by Socket

The code is a build script that performs file operations, obfuscation, and minification. It does not exhibit any malicious behavior, but the use of obfuscation could be a concern if the intent was to hide malicious code. However, in this context, it appears to be a legitimate use case.

Live on npm for 3 hours and 38 minutes before removal. Socket users were protected even while the package was live.

rrshare

3.10.9

Live on pypi

Blocked by Socket

The code unconditionally kills all running Streamlit processes and then attempts to start a Streamlit app from a user-specific path. This behavior can disrupt legitimate usage and execute potentially untrusted user code without validation. While it may be intended for self-restart or deployment, the lack of safety nets (validation, error handling, logging, and user prompts) represents a significant reliability and security risk that warrants safer alternatives (graceful shutdown, confirm prompts, path validation, and explicit permissions).

mtmai

0.3.1556

Live on pypi

Blocked by Socket

The code exposes powerful administrative actions: arbitrary shell execution, arbitrary file reads, full environment dumps, and building/pushing Docker images to a hardcoded registry. These are not obfuscated but are high-risk capabilities that can be abused for data exfiltration, remote code execution, and supply-chain leakage if the superuser authentication is compromised or misconfigured. The presence of a hardcoded remote image name for docker push is suspicious for unintended outbound artifact exfiltration. Recommendation: avoid including these endpoints in public packages or ensure strict, auditable authentication and input validation; remove hardcoded push targets and avoid returning full environment variables or arbitrary file contents.

cl-lite

1.0.955

by michael_tian

Live on npm

Blocked by Socket

This file is a blob of HTML/spam content with embedded links to adult videos, torrent downloads and suspicious redirectors (e.g. https://2023[.]redircdn[.]com/?…, http://rmdown[.]com/link[.]php?hash=…, http://data[.]down2048[.]com/list[.]php?…), plus numerous third-party image URLs. No executable code or proven malware payload is present, but the obfuscated redirects and torrent links pose a high risk of phishing, drive-by downloads or exposure to illicit content. Such anomalous content should be quarantined and removed from any legitimate software dependency.

@retail-core/rds

1.0.4

by retail-core

Live on npm

Blocked by Socket

The file collects host system details (hostname via os.hostname(), current user and UID via os.userInfo(), Windows admin status via child_process.execSync('net session') and domain info via systeminfo), then disables TLS certificate validation by setting process.env['NODE_TLS_REJECT_UNAUTHORIZED']=0. It builds and sends an HTTPS GET request containing the username, admin status, hostname and __dirname to a suspicious endpoint at eewq2suvescxne0e5cdqgj6nnet5hu[.]oastify[.]com, indicating unauthorized data exfiltration and malicious intent.

sl-abuse

1.4.5

Live on pypi

Blocked by Socket

This file implements straightforward data exfiltration: it solicits arbitrary input and forwards it to a fixed external WhatsApp number using hardcoded Twilio credentials. That combination constitutes a high security risk — credentials should be treated as compromised, rotated immediately, and removed from source control. The code should not be executed. There is no complex obfuscation or advanced malware behavior, but the practical effect is malicious (unauthorized data transmission and credential leakage). Remediation: remove credentials, use secure secret storage, require explicit destination confirmation, add input validation/consent and logging, and avoid os.system calls.

ws-api-typescript-infra

0.0.0

by dorem

Removed from npm

Blocked by Socket

The code exhibits behavior consistent with malicious activity, specifically data exfiltration via DNS queries.

Live on npm for 5 days, 3 hours and 41 minutes before removal. Socket users were protected even while the package was live.

package-inherit

0.1.4

by smaroop

Removed from npm

Blocked by Socket

The code is engaging in potentially malicious behavior by collecting and transmitting sensitive system information to an external server without user consent. The domain used is suspicious, indicating a high risk of data theft.

Live on npm for 8 days, 6 hours and 50 minutes before removal. Socket users were protected even while the package was live.

354766/inference-sh-9/skills/youtube-thumbnail-design/

f0e401f3b2a695ebbbdc7720b8a3c495713e2d0c

Live on socket

Blocked by Socket

[Skill Scanner] Pipe-to-shell or eval pattern detected All findings: [CRITICAL] command_injection: Pipe-to-shell or eval pattern detected (CI013) [AITech 9.1.4] [CRITICAL] command_injection: Natural language instruction to download and install from URL detected (CI009) [AITech 9.1.4] [CRITICAL] command_injection: Natural language instruction to download and install from URL detected (CI009) [AITech 9.1.4] This skill/instruction doc appears functionally legitimate and aligned with its stated purpose (YouTube thumbnail design using a remote inference CLI). However, it contains moderately high supply-chain risk patterns: a curl|sh installer that downloads and executes a CLI from inference.sh/dist.inference.sh, plus examples that send prompts and (potentially) images and authentication tokens to a third-party service. There are no hardcoded secrets or obfuscated code in the provided text. Recommend treating the installer pattern as risky: prefer pinned, auditable installs (manual checksum verification before execution), clear documentation on where credentials go, and least-privilege CLI invocation. Overall: no clear malware, but medium-to-high supply-chain/security risk due to download-and-execute and credential/ data-forwarding patterns. LLM verification: The SKILL.md is a benign thumbnail-design guide but instructs users to install and use a third-party CLI via a pipe-to-shell pattern and to authenticate that CLI. The immediate risks are supply-chain and credential exposure: executing a remote install script and sending prompts/files/credentials to external inference endpoints. There is no embedded malware in the text itself, but the recommended operational flow is high-risk. Recommendation: do not execute the pipe-to-shell installer without ind

winsystemshell

0.0.1

Live on pypi

Blocked by Socket

This module implements a named-pipe remote shell: it creates named pipes with an 'Everyone' security descriptor, waits for client connections, redirects stdio to the pipes, and execs a shell (cmd.exe by default). That gives any connected client interactive command execution on the host with no authentication. This is functionally a backdoor/remote shell and poses a high security risk; treat as malicious or potentially dangerous unless you can verify intended, secure use and restrict access.

filecat

2.2.3

by xiaobaidadada

Live on npm

Blocked by Socket

The fragment appears to implement a browser-based remote session/control surface that captures user input and forwards it to a remote host, with session lifecycle management and remote-render updates. While such functionality can be legitimate for authorized remote-management tools, the pattern poses data-exposure and credential-usage risks, especially given localStorage-based tokens and heavy obfuscation. Key risk mitigations include strict authentication/authorization, encrypted transport, explicit user consent, minimal token exposure, auditable telemetry, and a security review of the remote endpoints and dynamic module loading paths. Overall, this is a medium-to-high risk component in a supply chain context if not clearly sanctioned and properly secured.

admin10001

1.0.311

by rank121

Removed from npm

Blocked by Socket

This preinstall script is explicitly malicious. It tries to steal AWS IAM credentials and environment details, probes for Docker socket access, and establishes a reverse shell to an attacker-controlled host. Do not install this package. If it was installed on any system, assume compromise: disconnect affected hosts, rotate any exposed credentials (IAM keys, tokens), revoke suspected sessions/keys, inspect for persistence or other malicious artifacts, and perform a full incident response.

Live on npm for 2 hours and 50 minutes before removal. Socket users were protected even while the package was live.

github.com/openshift/origin

v0.0.0-20251125041922-0fed5582d8a6

Live on go

Blocked by Socket

High security concern: this module packages a dockercfg secret into a Docker image and includes a Ruby/Rack HTTP endpoint that can disclose arbitrary file contents by mapping URL paths to environment variables, including an ENV key that directly points to the embedded dockercfg. The image is then built and pushed to a registry, distributing the credential-leak/backdoor capability via the supply chain. Review/disable and investigate any downstream use of the produced artifact; treat as likely malicious even though direct external exfiltration is not shown in this snippet.

lg-rez

4.0.17.2

Live on pypi

Blocked by Socket

This module exposes critical remote execution capabilities via Discord commands. `/do` performs `exec()` on attacker-controlled input in a context containing `globals()` and live objects, then returns results and tracebacks to the user. `/shell` launches an interactive `RealShell` with the same powerful context. Additionally, `/panik` provides a direct kill-switch (`sys.exit()`), and `setup` can perform destructive admin operations (roles/channels/emojis/icon, including deleting channels). While intent may be “admin/debug,” the explicit primitives are backdoor-grade risks unless ironclad authorization is proven in the unseen decorators/handlers. Based on this fragment alone, treat the security risk as critical/unsafe.

ctf-payload

1.0.47

by duonghello

Live on npm

Blocked by Socket

This JavaScript is intentionally malicious. It actively probes for sensitive data using SQL-injection-style payloads, aggregates responses, and exfiltrates them by posting to a comment endpoint. It also redirects remote users to a localhost service to access internal-only functionality. Remove this code immediately, audit server endpoints ('/check-resolve', '/post-comment') and logs, verify database query handling for SQL injection, and search the codebase and dependencies for the source of this injected script.

serval-integrations-common-frontend

7.0.0

by hackerone0101

Live on npm

Blocked by Socket

The preinstall hook will execute index.js during npm install. That grants the package the ability to run arbitrary code on the host. Without inspecting index.js, this is potentially dangerous and should be treated as suspicious. Review the contents of index.js (and any files it loads or network endpoints it contacts) before installing, or avoid installing packages that require running preinstall scripts from untrusted sources.

featureform-enterprise

0.13.39rc0

Live on pypi

Blocked by Socket

This module contains a critical security risk: it compiles and execs arbitrary local and remote Python content without any integrity, authentication, sandboxing, or allow-listing. While the file itself is not obfuscated and contains no explicit hardcoded malware, the use of exec on untrusted input constitutes a high-probability supply-chain and arbitrary code execution vulnerability. Treat this as a high security risk; remediate by eliminating or strongly controlling exec-based execution.

pjfun

0.0.17

by lxc9349

Removed from npm

Blocked by Socket

The code is a webpack runtime bootstrap with obfuscation and an explicit publicPath pointing to an external CDN (https://unpkg.com/pjfun@0.0.17/). It also overrides console methods (log/trace/warn/etc.), likely to suppress or control logging. The runtime itself does not directly exfiltrate data or open a reverse shell in the shown fragment, but setting publicPath to a remote host is a notable supply-chain risk because additional chunks will be fetched from that remote location and executed. The code is obfuscated and contains anti-debugging/log-suppression behavior; this increases risk and warrants close review of any remotely-loaded modules. Recommend treating the external CDN URL as untrusted and auditing any loaded modules or changing publicPath to a trusted source.

Live on npm for 19 minutes before removal. Socket users were protected even while the package was live.

tagmyphotosblog

1.0.0

by test6uy767

Removed from npm

Blocked by Socket

The code is malicious as it collects and sends sensitive system data to a suspicious domain without user consent. This poses a high security risk due to potential data theft and privacy invasion.

Live on npm for 2 days, 8 hours and 13 minutes before removal. Socket users were protected even while the package was live.

doughnuts

4.9.0

Live on pypi

Blocked by Socket

This module implements reverse-shell/backdoor functionality that constructs and sends payloads (bash/python/php) to a target ip:port and attempts to execute them via get_system_code/send utilities. The behavior is malicious for general use and represents a high security risk in a dependency. The code also contains syntactic corruption which may indicate tampering or redaction but does not reduce the clear backdoor intent. Remove and investigate this package and any related packages from the same author/publisher unless its presence is explicitly authorized for controlled offensive security use.

gamspy-base

53.3.0

Live on pypi

Blocked by Socket

The provided code executes an unknown executable, which poses potential security risks. Further investigation into gmscvnnx.exe is necessary to determine its behavior and any associated risks.

bluelamp-ai

1.0.1

Live on pypi

Blocked by Socket

This file intentionally conceals and dynamically executes an embedded payload. The pattern (base64 + zlib + exec on import) is high-risk: it prevents static review and enables arbitrary code execution at import time. Treat the package as untrusted until the embedded payload is decompressed and analyzed in a safe sandbox. Immediate mitigation: do not import/run this module in production; extract and inspect the decompressed string in isolation.

smartchart

7.7

Live on pypi

Blocked by Socket

This file contains Python code that decodes base64-encoded data, decompresses it with LZMA, and then executes the resulting payload using the 'exec' function. This sequence is a common method of obfuscating unauthorized or malicious code to evade detection. No additional domains or IP addresses were identified in the code. The hidden payload’s purpose remains unclear without analyzing the decompressed content, but the combination of obfuscation and runtime execution indicates a high likelihood of malicious intent.

remotesystemlogger

1.0.1

Removed from pypi

Blocked by Socket

This code is malicious and implements credential harvesting: it reads AWS credentials from ~/.aws/credentials, encodes them, and exfiltrates them via HTTP GET requests to a hardcoded remote IP. The base64-encoded target strings and hardcoded IP indicate intent to hide behavior. Even though the snippet contains a syntax error that would prevent execution in its current form, the logic and network exfiltration are clear and dangerous. Treat this code as a high-risk backdoor and do not run or include it in dependencies.

Live on pypi for 3 days, 23 hours and 3 minutes before removal. Socket users were protected even while the package was live.

passagemath-standard

10.4.4

Removed from pypi

Blocked by Socket

This fragment implements an unrestricted evaluator for Python source that executes caller-provided code with the privileges of the host process. The fragment itself contains no embedded malicious payloads, but it creates a critical security boundary: if x can be influenced by untrusted actors, this is a direct remote code execution vector. Recommend: do not use with untrusted input. If dynamic evaluation is required, adopt strong sandboxing (separate process with least privileges, seccomp/containers, restricted builtins, explicit whitelist of allowed operations, time/memory limits) or use a safe domain-specific evaluator rather than exec/eval on raw Python source.

Live on pypi for 16 hours and 32 minutes before removal. Socket users were protected even while the package was live.

directory-obfuscator

1.0.2

by dpm97

Removed from npm

Blocked by Socket

The code is a build script that performs file operations, obfuscation, and minification. It does not exhibit any malicious behavior, but the use of obfuscation could be a concern if the intent was to hide malicious code. However, in this context, it appears to be a legitimate use case.

Live on npm for 3 hours and 38 minutes before removal. Socket users were protected even while the package was live.

rrshare

3.10.9

Live on pypi

Blocked by Socket

The code unconditionally kills all running Streamlit processes and then attempts to start a Streamlit app from a user-specific path. This behavior can disrupt legitimate usage and execute potentially untrusted user code without validation. While it may be intended for self-restart or deployment, the lack of safety nets (validation, error handling, logging, and user prompts) represents a significant reliability and security risk that warrants safer alternatives (graceful shutdown, confirm prompts, path validation, and explicit permissions).

mtmai

0.3.1556

Live on pypi

Blocked by Socket

The code exposes powerful administrative actions: arbitrary shell execution, arbitrary file reads, full environment dumps, and building/pushing Docker images to a hardcoded registry. These are not obfuscated but are high-risk capabilities that can be abused for data exfiltration, remote code execution, and supply-chain leakage if the superuser authentication is compromised or misconfigured. The presence of a hardcoded remote image name for docker push is suspicious for unintended outbound artifact exfiltration. Recommendation: avoid including these endpoints in public packages or ensure strict, auditable authentication and input validation; remove hardcoded push targets and avoid returning full environment variables or arbitrary file contents.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Git dependency

GitHub dependency

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

Telemetry

Protestware or potentially unwanted behavior

Unstable ownership

55 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a Demo

Questions? Call us at (844) SOCKET-0

Read the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles