🚀 Big News:Socket Has Acquired Secure Annex.Learn More →
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

•

left-pad
s

stevemao published 1.3.0

•

react
r

react-bot published 19.2.5

•

We protect you from vulnerable and malicious packages

@yuf1011/openclaw

2026.5.1

by yuf1011

Live on npm

Blocked by Socket

This module is high-risk and highly consistent with credential/session theft. It automatically discovers and reads local browser cookie databases on macOS, decrypts Chromium-family cookies using macOS Keychain to recover a Claude `sessionKey`, then uses that stolen session in a Cookie header to query Claude/Anthropic endpoints for organization/usage data, with optional sensitive logging of tokens/sessionKey. Even though the network destinations are first-party Claude endpoints, the core behavior is unauthorized local secret access and authenticated reuse.

onairos

8.1.1

by anushkajogalekar

Live on npm

Blocked by Socket

This module is an obfuscated client-side widget/bootstrapping script that injects UI (styles + button/container) and dynamically loads additional code chunks at runtime. It contains a high-risk execution primitive (new Function) and dynamic script/chunk injection, which are frequently used in supply-chain loaders/packers. The excerpt does not prove malware or data theft on its own, but it materially warrants manual review of the loaded chunks for network destinations and tracking/exfiltration behavior, and validation that configuration inputs cannot lead to DOM-based injection/XSS.

gcpwn

0.5.1

Live on pypi

Blocked by Socket

This module is an exploit-oriented harness for serverless code execution in Google Cloud Functions. It can deploy or update a Cloud Function using a ZIP payload from an operator-controlled or default GCS source, invoke the function, and (with --assume-creds) parse the response to extract an access token and persist it as an OAuth2 account—i.e., credential/token harvesting. It also prints potentially sensitive session credential JSON to stdout. Overall, the orchestration strongly matches malicious supply-chain/exploitation behavior with high security risk.

@aztec/noir-protocol-circuits-types

5.0.0-nightly.20260501

by charlielye

Live on npm

Blocked by Socket

The provided fragment is overwhelmingly consistent with a packed/embedded payload with no visible operational logic. While there are no explicit malicious sinks observable in the snippet itself, the concealment level is a serious supply-chain red flag because the decoded payload could perform arbitrary actions. Treat the dependency as suspicious and inspect the complete module for any decode/deobfuscation and execution flow, along with network/filesystem/process behaviors.

clawdaddy

1.0.3

by goodenoughcafe

Live on npm

Blocked by Socket

This module acts as an obfuscated command/tool dispatcher: it extracts a command token and optional JSON-like arguments from an input string, parses arguments best-effort, then forwards the command and arguments to a generic connection_1 handler and logs the results/errors. The lack of validation/sanitization and the explicit “executing command” dispatch pattern make it high-risk for unsafe behavior. The exact maliciousness depends on connection_1 and upstream input sources, but the observed structure is strongly consistent with a backdoor-like or agent-like mechanism capable of performing or proxying privileged actions and leaking outputs through console logging.

@flamerged/sshshot

0.3.0

by GitHub Actions

Live on npm

Blocked by Socket

This module is strongly indicative of surveillance/collection behavior: it monitors the user’s clipboard images and macOS screenshots, computes hashes to detect changes, saves locally and/or exfiltrates the captured image bytes to a remote host via SSH, and copies the resulting paths to the clipboard. The Windows implementation uses hidden encoded PowerShell for clipboard capture. While exact malicious intent cannot be proven from a single file, the functionality closely aligns with spyware/exfiltration tooling. Review/contain/remove this dependency urgently if unexpected in your project.

@elizaos/ui

2.0.0-alpha.529

by shawticus

Live on npm

Blocked by Socket

The fragment includes a highly sensitive endpoint (/api/wallet/export) that returns raw wallet private keys (EVM_PRIVATE_KEY and SOLANA_PRIVATE_KEY) directly in the HTTP JSON response. This is a credential-exfiltration sink and is extremely dangerous if the endpoint is not strictly authenticated/authorized (not shown in the snippet). The code also persists and propagates private keys into process.env and config, increasing risk. Aside from this, the rest appears to be wallet provisioning/config logic with network calls to steward/cloud services.

nexus-omni-agent

3.0.487

by baguscrypto321

Live on npm

Blocked by Socket

The /hack endpoint provides remote, user-controlled execution of recon/exploitation tooling and includes a critical bash -c fallback that evaluates attacker-controlled strings, turning the service into a remote command execution mechanism (even if containerized). Additionally, /leak returns hardcoded breach results marked as pwned=True without verification, suggesting deceptive/social-engineering intent. Overall, this module is high-risk and should be treated as unsafe to deploy; remove the bash -c fallback, enforce strict authentication/authorization, and restrict execution to a narrowly validated allowlist without returning raw stderr/stdout to clients.

skykoi

2026.3.232

by ricardoamartinez

Live on npm

Blocked by Socket

This module is engineered to install and run a local “gateway” payload via Windows Scheduled Tasks on user logon, with an additional Startup-folder .cmd fallback when scheduler installation lacks privileges. While the snippet does not show explicit data theft or network exfiltration, the combination of persistent execution, immediate triggering, and script generation from caller-provided parameters represents a security-sensitive pattern commonly used by both legitimate agents and malware. Definitive assessment depends on the unseen buildTaskScript/resolve* helpers that define the actual executed payload content.

gweb-build-system

50.50.50

by saif777

Live on npm

Blocked by Socket

This fragment is best classified as malicious supply-chain behavior: it performs system/build reconnaissance (public IP, hostname, OS, directory path, CI detection, and environment variable key enumeration) and exfiltrates the data to a hardcoded Discord webhook over HTTPS. The webhook URL is obscured with base64 decoding and failures are suppressed, both of which are strong anti-detection indicators. No legitimate functional purpose is evident beyond telemetry/exfiltration.

nexus-omni-agent

3.0.575

by baguscrypto321

Live on npm

Blocked by Socket

The /hack endpoint provides remote, user-controlled execution of recon/exploitation tooling and includes a critical bash -c fallback that evaluates attacker-controlled strings, turning the service into a remote command execution mechanism (even if containerized). Additionally, /leak returns hardcoded breach results marked as pwned=True without verification, suggesting deceptive/social-engineering intent. Overall, this module is high-risk and should be treated as unsafe to deploy; remove the bash -c fallback, enforce strict authentication/authorization, and restrict execution to a narrowly validated allowlist without returning raw stderr/stdout to clients.

onairos

8.1.2

by anushkajogalekar

Live on npm

Blocked by Socket

Significant supply-chain/sandboxing risk. This module is an obfuscated browser loader/widget that performs DOM HTML/script injection, registers global functions, and uses new Function(...) plus runtime-decoding and dynamic module initialization. Although the snippet does not explicitly show a concrete exfiltration endpoint, the combination of high-risk execution primitives (new Function + injected scripts) and runtime-loaded behavior makes it unsafe to treat as a benign UI component without further inspection of the dynamically loaded modules and injected script sources.

nexus-omni-agent

3.0.534

by baguscrypto321

Live on npm

Blocked by Socket

The /hack endpoint provides remote, user-controlled execution of recon/exploitation tooling and includes a critical bash -c fallback that evaluates attacker-controlled strings, turning the service into a remote command execution mechanism (even if containerized). Additionally, /leak returns hardcoded breach results marked as pwned=True without verification, suggesting deceptive/social-engineering intent. Overall, this module is high-risk and should be treated as unsafe to deploy; remove the bash -c fallback, enforce strict authentication/authorization, and restrict execution to a narrowly validated allowlist without returning raw stderr/stdout to clients.

nexus-omni-agent

3.0.563

by baguscrypto321

Live on npm

Blocked by Socket

The /hack endpoint provides remote, user-controlled execution of recon/exploitation tooling and includes a critical bash -c fallback that evaluates attacker-controlled strings, turning the service into a remote command execution mechanism (even if containerized). Additionally, /leak returns hardcoded breach results marked as pwned=True without verification, suggesting deceptive/social-engineering intent. Overall, this module is high-risk and should be treated as unsafe to deploy; remove the bash -c fallback, enforce strict authentication/authorization, and restrict execution to a narrowly validated allowlist without returning raw stderr/stdout to clients.

w-screenctl

1.0.0

by semisphere

Live on npm

Blocked by Socket

High-risk remote control/surveillance behavior: the code starts an HTTP server on 0.0.0.0 that allows a client to navigate a persistent browser, execute attacker-supplied code in the page (page.evaluate with request-provided script), and capture/return screenshots and drive host mouse/keyboard via xdotool/AutoHotkey. This strongly matches spyware/remote access tool functionality rather than a benign library.

nexus-omni-agent

3.0.418

by baguscrypto321

Live on npm

Blocked by Socket

The /hack endpoint provides remote, user-controlled execution of recon/exploitation tooling and includes a critical bash -c fallback that evaluates attacker-controlled strings, turning the service into a remote command execution mechanism (even if containerized). Additionally, /leak returns hardcoded breach results marked as pwned=True without verification, suggesting deceptive/social-engineering intent. Overall, this module is high-risk and should be treated as unsafe to deploy; remove the bash -c fallback, enforce strict authentication/authorization, and restrict execution to a narrowly validated allowlist without returning raw stderr/stdout to clients.

skykoi

2026.3.238

by ricardoamartinez

Live on npm

Blocked by Socket

This module is engineered to install and run a local “gateway” payload via Windows Scheduled Tasks on user logon, with an additional Startup-folder .cmd fallback when scheduler installation lacks privileges. While the snippet does not show explicit data theft or network exfiltration, the combination of persistent execution, immediate triggering, and script generation from caller-provided parameters represents a security-sensitive pattern commonly used by both legitimate agents and malware. Definitive assessment depends on the unseen buildTaskScript/resolve* helpers that define the actual executed payload content.

nexus-omni-agent

3.0.469

by baguscrypto321

Live on npm

Blocked by Socket

The /hack endpoint provides remote, user-controlled execution of recon/exploitation tooling and includes a critical bash -c fallback that evaluates attacker-controlled strings, turning the service into a remote command execution mechanism (even if containerized). Additionally, /leak returns hardcoded breach results marked as pwned=True without verification, suggesting deceptive/social-engineering intent. Overall, this module is high-risk and should be treated as unsafe to deploy; remove the bash -c fallback, enforce strict authentication/authorization, and restrict execution to a narrowly validated allowlist without returning raw stderr/stdout to clients.

nexus-omni-agent

3.0.493

by baguscrypto321

Live on npm

Blocked by Socket

The /hack endpoint provides remote, user-controlled execution of recon/exploitation tooling and includes a critical bash -c fallback that evaluates attacker-controlled strings, turning the service into a remote command execution mechanism (even if containerized). Additionally, /leak returns hardcoded breach results marked as pwned=True without verification, suggesting deceptive/social-engineering intent. Overall, this module is high-risk and should be treated as unsafe to deploy; remove the bash -c fallback, enforce strict authentication/authorization, and restrict execution to a narrowly validated allowlist without returning raw stderr/stdout to clients.

nexus-omni-agent

3.0.467

by baguscrypto321

Live on npm

Blocked by Socket

The /hack endpoint provides remote, user-controlled execution of recon/exploitation tooling and includes a critical bash -c fallback that evaluates attacker-controlled strings, turning the service into a remote command execution mechanism (even if containerized). Additionally, /leak returns hardcoded breach results marked as pwned=True without verification, suggesting deceptive/social-engineering intent. Overall, this module is high-risk and should be treated as unsafe to deploy; remove the bash -c fallback, enforce strict authentication/authorization, and restrict execution to a narrowly validated allowlist without returning raw stderr/stdout to clients.

path-internal

1.0.12

by gabrilasilva1

Live on npm

Blocked by Socket

This module is a supply-chain backdoor pattern: it fetches a base64-obscured remote URL, retrieves a JSON payload, and executes a remote string via eval() during module load/import. That combination strongly indicates malicious intent and yields a very high security risk for any project that installs or imports this dependency.

nexus-omni-agent

3.0.528

by baguscrypto321

Live on npm

Blocked by Socket

The /hack endpoint provides remote, user-controlled execution of recon/exploitation tooling and includes a critical bash -c fallback that evaluates attacker-controlled strings, turning the service into a remote command execution mechanism (even if containerized). Additionally, /leak returns hardcoded breach results marked as pwned=True without verification, suggesting deceptive/social-engineering intent. Overall, this module is high-risk and should be treated as unsafe to deploy; remove the bash -c fallback, enforce strict authentication/authorization, and restrict execution to a narrowly validated allowlist without returning raw stderr/stdout to clients.

projectair

0.3.2

Live on pypi

Blocked by Socket

This fragment is highly suspicious and strongly consistent with malicious supply-chain/agent-runtime sabotage: it hardcodes an SSH private key-like secret and embeds prompt-injection instructions that direct reading /home/dev/.ssh/id_rsa and exfiltrating it to an attacker-controlled HTTP endpoint as the POST token. While the network call is not executed directly in this module, it is clearly encoded into signed demo records that could be executed by a surrounding framework. It also includes a function to tamper with log records, further supporting stealth/trace manipulation. Treat as malware-level risk for any system that might interpret/exeсute these generated steps.

@superblocksteam/cli

2.0.115-next.2

by superblocksteam-admin

Live on npm

Blocked by Socket

This fragment performs import-time tampering of process environment variables to inject Git repository metadata—most notably a credential-like token embedded in the repository URL—then patches global module-resolution context and immediately executes bundled spans logic plus a side-effect chunk. While the ultimate malicious impact cannot be confirmed without the imported chunks, the credential-in-environment pattern and forced metadata manipulation are significant security risks consistent with covert supply-chain/telemetry behavior.

tyrex-tool

1.0.5

Live on pypi

Blocked by Socket

This module is a high-risk supply-chain loader: it copies bundled “keys” into a user-writable directory, downloads an executable from a hardcoded external identifier using gdown with no authenticity/integrity verification, and immediately executes the downloaded EXE. Even without confirming what the payload does, the code materially enables arbitrary code execution under the current user and is consistent with malicious distribution/dropping patterns.

@yuf1011/openclaw

2026.5.1

by yuf1011

Live on npm

Blocked by Socket

This module is high-risk and highly consistent with credential/session theft. It automatically discovers and reads local browser cookie databases on macOS, decrypts Chromium-family cookies using macOS Keychain to recover a Claude `sessionKey`, then uses that stolen session in a Cookie header to query Claude/Anthropic endpoints for organization/usage data, with optional sensitive logging of tokens/sessionKey. Even though the network destinations are first-party Claude endpoints, the core behavior is unauthorized local secret access and authenticated reuse.

onairos

8.1.1

by anushkajogalekar

Live on npm

Blocked by Socket

This module is an obfuscated client-side widget/bootstrapping script that injects UI (styles + button/container) and dynamically loads additional code chunks at runtime. It contains a high-risk execution primitive (new Function) and dynamic script/chunk injection, which are frequently used in supply-chain loaders/packers. The excerpt does not prove malware or data theft on its own, but it materially warrants manual review of the loaded chunks for network destinations and tracking/exfiltration behavior, and validation that configuration inputs cannot lead to DOM-based injection/XSS.

gcpwn

0.5.1

Live on pypi

Blocked by Socket

This module is an exploit-oriented harness for serverless code execution in Google Cloud Functions. It can deploy or update a Cloud Function using a ZIP payload from an operator-controlled or default GCS source, invoke the function, and (with --assume-creds) parse the response to extract an access token and persist it as an OAuth2 account—i.e., credential/token harvesting. It also prints potentially sensitive session credential JSON to stdout. Overall, the orchestration strongly matches malicious supply-chain/exploitation behavior with high security risk.

@aztec/noir-protocol-circuits-types

5.0.0-nightly.20260501

by charlielye

Live on npm

Blocked by Socket

The provided fragment is overwhelmingly consistent with a packed/embedded payload with no visible operational logic. While there are no explicit malicious sinks observable in the snippet itself, the concealment level is a serious supply-chain red flag because the decoded payload could perform arbitrary actions. Treat the dependency as suspicious and inspect the complete module for any decode/deobfuscation and execution flow, along with network/filesystem/process behaviors.

clawdaddy

1.0.3

by goodenoughcafe

Live on npm

Blocked by Socket

This module acts as an obfuscated command/tool dispatcher: it extracts a command token and optional JSON-like arguments from an input string, parses arguments best-effort, then forwards the command and arguments to a generic connection_1 handler and logs the results/errors. The lack of validation/sanitization and the explicit “executing command” dispatch pattern make it high-risk for unsafe behavior. The exact maliciousness depends on connection_1 and upstream input sources, but the observed structure is strongly consistent with a backdoor-like or agent-like mechanism capable of performing or proxying privileged actions and leaking outputs through console logging.

@flamerged/sshshot

0.3.0

by GitHub Actions

Live on npm

Blocked by Socket

This module is strongly indicative of surveillance/collection behavior: it monitors the user’s clipboard images and macOS screenshots, computes hashes to detect changes, saves locally and/or exfiltrates the captured image bytes to a remote host via SSH, and copies the resulting paths to the clipboard. The Windows implementation uses hidden encoded PowerShell for clipboard capture. While exact malicious intent cannot be proven from a single file, the functionality closely aligns with spyware/exfiltration tooling. Review/contain/remove this dependency urgently if unexpected in your project.

@elizaos/ui

2.0.0-alpha.529

by shawticus

Live on npm

Blocked by Socket

The fragment includes a highly sensitive endpoint (/api/wallet/export) that returns raw wallet private keys (EVM_PRIVATE_KEY and SOLANA_PRIVATE_KEY) directly in the HTTP JSON response. This is a credential-exfiltration sink and is extremely dangerous if the endpoint is not strictly authenticated/authorized (not shown in the snippet). The code also persists and propagates private keys into process.env and config, increasing risk. Aside from this, the rest appears to be wallet provisioning/config logic with network calls to steward/cloud services.

nexus-omni-agent

3.0.487

by baguscrypto321

Live on npm

Blocked by Socket

The /hack endpoint provides remote, user-controlled execution of recon/exploitation tooling and includes a critical bash -c fallback that evaluates attacker-controlled strings, turning the service into a remote command execution mechanism (even if containerized). Additionally, /leak returns hardcoded breach results marked as pwned=True without verification, suggesting deceptive/social-engineering intent. Overall, this module is high-risk and should be treated as unsafe to deploy; remove the bash -c fallback, enforce strict authentication/authorization, and restrict execution to a narrowly validated allowlist without returning raw stderr/stdout to clients.

skykoi

2026.3.232

by ricardoamartinez

Live on npm

Blocked by Socket

This module is engineered to install and run a local “gateway” payload via Windows Scheduled Tasks on user logon, with an additional Startup-folder .cmd fallback when scheduler installation lacks privileges. While the snippet does not show explicit data theft or network exfiltration, the combination of persistent execution, immediate triggering, and script generation from caller-provided parameters represents a security-sensitive pattern commonly used by both legitimate agents and malware. Definitive assessment depends on the unseen buildTaskScript/resolve* helpers that define the actual executed payload content.

gweb-build-system

50.50.50

by saif777

Live on npm

Blocked by Socket

This fragment is best classified as malicious supply-chain behavior: it performs system/build reconnaissance (public IP, hostname, OS, directory path, CI detection, and environment variable key enumeration) and exfiltrates the data to a hardcoded Discord webhook over HTTPS. The webhook URL is obscured with base64 decoding and failures are suppressed, both of which are strong anti-detection indicators. No legitimate functional purpose is evident beyond telemetry/exfiltration.

nexus-omni-agent

3.0.575

by baguscrypto321

Live on npm

Blocked by Socket

The /hack endpoint provides remote, user-controlled execution of recon/exploitation tooling and includes a critical bash -c fallback that evaluates attacker-controlled strings, turning the service into a remote command execution mechanism (even if containerized). Additionally, /leak returns hardcoded breach results marked as pwned=True without verification, suggesting deceptive/social-engineering intent. Overall, this module is high-risk and should be treated as unsafe to deploy; remove the bash -c fallback, enforce strict authentication/authorization, and restrict execution to a narrowly validated allowlist without returning raw stderr/stdout to clients.

onairos

8.1.2

by anushkajogalekar

Live on npm

Blocked by Socket

Significant supply-chain/sandboxing risk. This module is an obfuscated browser loader/widget that performs DOM HTML/script injection, registers global functions, and uses new Function(...) plus runtime-decoding and dynamic module initialization. Although the snippet does not explicitly show a concrete exfiltration endpoint, the combination of high-risk execution primitives (new Function + injected scripts) and runtime-loaded behavior makes it unsafe to treat as a benign UI component without further inspection of the dynamically loaded modules and injected script sources.

nexus-omni-agent

3.0.534

by baguscrypto321

Live on npm

Blocked by Socket

The /hack endpoint provides remote, user-controlled execution of recon/exploitation tooling and includes a critical bash -c fallback that evaluates attacker-controlled strings, turning the service into a remote command execution mechanism (even if containerized). Additionally, /leak returns hardcoded breach results marked as pwned=True without verification, suggesting deceptive/social-engineering intent. Overall, this module is high-risk and should be treated as unsafe to deploy; remove the bash -c fallback, enforce strict authentication/authorization, and restrict execution to a narrowly validated allowlist without returning raw stderr/stdout to clients.

nexus-omni-agent

3.0.563

by baguscrypto321

Live on npm

Blocked by Socket

The /hack endpoint provides remote, user-controlled execution of recon/exploitation tooling and includes a critical bash -c fallback that evaluates attacker-controlled strings, turning the service into a remote command execution mechanism (even if containerized). Additionally, /leak returns hardcoded breach results marked as pwned=True without verification, suggesting deceptive/social-engineering intent. Overall, this module is high-risk and should be treated as unsafe to deploy; remove the bash -c fallback, enforce strict authentication/authorization, and restrict execution to a narrowly validated allowlist without returning raw stderr/stdout to clients.

w-screenctl

1.0.0

by semisphere

Live on npm

Blocked by Socket

High-risk remote control/surveillance behavior: the code starts an HTTP server on 0.0.0.0 that allows a client to navigate a persistent browser, execute attacker-supplied code in the page (page.evaluate with request-provided script), and capture/return screenshots and drive host mouse/keyboard via xdotool/AutoHotkey. This strongly matches spyware/remote access tool functionality rather than a benign library.

nexus-omni-agent

3.0.418

by baguscrypto321

Live on npm

Blocked by Socket

The /hack endpoint provides remote, user-controlled execution of recon/exploitation tooling and includes a critical bash -c fallback that evaluates attacker-controlled strings, turning the service into a remote command execution mechanism (even if containerized). Additionally, /leak returns hardcoded breach results marked as pwned=True without verification, suggesting deceptive/social-engineering intent. Overall, this module is high-risk and should be treated as unsafe to deploy; remove the bash -c fallback, enforce strict authentication/authorization, and restrict execution to a narrowly validated allowlist without returning raw stderr/stdout to clients.

skykoi

2026.3.238

by ricardoamartinez

Live on npm

Blocked by Socket

This module is engineered to install and run a local “gateway” payload via Windows Scheduled Tasks on user logon, with an additional Startup-folder .cmd fallback when scheduler installation lacks privileges. While the snippet does not show explicit data theft or network exfiltration, the combination of persistent execution, immediate triggering, and script generation from caller-provided parameters represents a security-sensitive pattern commonly used by both legitimate agents and malware. Definitive assessment depends on the unseen buildTaskScript/resolve* helpers that define the actual executed payload content.

nexus-omni-agent

3.0.469

by baguscrypto321

Live on npm

Blocked by Socket

The /hack endpoint provides remote, user-controlled execution of recon/exploitation tooling and includes a critical bash -c fallback that evaluates attacker-controlled strings, turning the service into a remote command execution mechanism (even if containerized). Additionally, /leak returns hardcoded breach results marked as pwned=True without verification, suggesting deceptive/social-engineering intent. Overall, this module is high-risk and should be treated as unsafe to deploy; remove the bash -c fallback, enforce strict authentication/authorization, and restrict execution to a narrowly validated allowlist without returning raw stderr/stdout to clients.

nexus-omni-agent

3.0.493

by baguscrypto321

Live on npm

Blocked by Socket

The /hack endpoint provides remote, user-controlled execution of recon/exploitation tooling and includes a critical bash -c fallback that evaluates attacker-controlled strings, turning the service into a remote command execution mechanism (even if containerized). Additionally, /leak returns hardcoded breach results marked as pwned=True without verification, suggesting deceptive/social-engineering intent. Overall, this module is high-risk and should be treated as unsafe to deploy; remove the bash -c fallback, enforce strict authentication/authorization, and restrict execution to a narrowly validated allowlist without returning raw stderr/stdout to clients.

nexus-omni-agent

3.0.467

by baguscrypto321

Live on npm

Blocked by Socket

The /hack endpoint provides remote, user-controlled execution of recon/exploitation tooling and includes a critical bash -c fallback that evaluates attacker-controlled strings, turning the service into a remote command execution mechanism (even if containerized). Additionally, /leak returns hardcoded breach results marked as pwned=True without verification, suggesting deceptive/social-engineering intent. Overall, this module is high-risk and should be treated as unsafe to deploy; remove the bash -c fallback, enforce strict authentication/authorization, and restrict execution to a narrowly validated allowlist without returning raw stderr/stdout to clients.

path-internal

1.0.12

by gabrilasilva1

Live on npm

Blocked by Socket

This module is a supply-chain backdoor pattern: it fetches a base64-obscured remote URL, retrieves a JSON payload, and executes a remote string via eval() during module load/import. That combination strongly indicates malicious intent and yields a very high security risk for any project that installs or imports this dependency.

nexus-omni-agent

3.0.528

by baguscrypto321

Live on npm

Blocked by Socket

The /hack endpoint provides remote, user-controlled execution of recon/exploitation tooling and includes a critical bash -c fallback that evaluates attacker-controlled strings, turning the service into a remote command execution mechanism (even if containerized). Additionally, /leak returns hardcoded breach results marked as pwned=True without verification, suggesting deceptive/social-engineering intent. Overall, this module is high-risk and should be treated as unsafe to deploy; remove the bash -c fallback, enforce strict authentication/authorization, and restrict execution to a narrowly validated allowlist without returning raw stderr/stdout to clients.

projectair

0.3.2

Live on pypi

Blocked by Socket

This fragment is highly suspicious and strongly consistent with malicious supply-chain/agent-runtime sabotage: it hardcodes an SSH private key-like secret and embeds prompt-injection instructions that direct reading /home/dev/.ssh/id_rsa and exfiltrating it to an attacker-controlled HTTP endpoint as the POST token. While the network call is not executed directly in this module, it is clearly encoded into signed demo records that could be executed by a surrounding framework. It also includes a function to tamper with log records, further supporting stealth/trace manipulation. Treat as malware-level risk for any system that might interpret/exeсute these generated steps.

@superblocksteam/cli

2.0.115-next.2

by superblocksteam-admin

Live on npm

Blocked by Socket

This fragment performs import-time tampering of process environment variables to inject Git repository metadata—most notably a credential-like token embedded in the repository URL—then patches global module-resolution context and immediately executes bundled spans logic plus a side-effect chunk. While the ultimate malicious impact cannot be confirmed without the imported chunks, the credential-in-environment pattern and forced metadata manipulation are significant security risks consistent with covert supply-chain/telemetry behavior.

tyrex-tool

1.0.5

Live on pypi

Blocked by Socket

This module is a high-risk supply-chain loader: it copies bundled “keys” into a user-writable directory, downloads an executable from a hardcoded external identifier using gdown with no authenticity/integrity verification, and immediately executes the downloaded EXE. Even without confirming what the payload does, the code materially enables arbitrary code execution under the current user and is consistent with malicious distribution/dropping patterns.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Git dependency

GitHub dependency

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

Telemetry

Protestware or potentially unwanted behavior

Unstable ownership

56 more alerts →

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love →
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a Demo

Questions? Call us at (844) SOCKET-0

Read the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles →