Launch Week Day 5: Introducing Reachability for PHP.Learn More
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.5

We protect you from vulnerable and malicious packages

ai-dispatch

8.63.0

Live on cargo

Blocked by Socket

Significant supply-chain and runtime risk due to load_hooks() forcibly marking all hooks as trusted, combined with shell-based command execution and payload piping. If hooks.toml or CLI specs are compromised, attackers can execute arbitrary commands with access to task payloads. Improve by removing unconditional trust elevation, implementing provenance-based trust (e.g., digital signatures or origin checks), and replacing shell invocation with safer, explicit process execution with strict argument validation. Consider isolating hook execution and minimizing payload exposure to hooks.

bigdl-orca-spark3

2.5.0b20240316

Live on pypi

Blocked by Socket

The code contains potential security risks such as hard-coded file paths, subprocess.Popen usage, and the handling of untrusted data through PyArrow Plasma. It is essential to review and address these security concerns before using this code in a production environment.

ziplip

2.0.2

Live on pypi

Blocked by Socket

This script intentionally hides and immediately executes a large embedded payload via base64 decoding and sourcing. That pattern is high-risk and commonly used for malicious purposes (droppers, backdoors, stealthy installers). Without decoding the blob, exact behavior is unknown, but the execution technique and heavy obfuscation justify treating this file as dangerous. Do not execute; decode and fully audit the payload in a controlled sandbox before any use.

routersploit

3.4.7

Live on pypi

Blocked by Socket

The code implements a TCP bind shell, which poses a significant security risk due to its ability to execute arbitrary commands remotely without authentication. This functionality is often associated with malicious activities, such as unauthorized access and control over a system.

anosys-openai-agents-logger

0.0.24

Live on pypi

Blocked by Socket

This module implements an OpenTelemetry SpanExporter that extracts many span attributes (including LLM inputs/outputs and token counts) and posts them to an external URL (default https://www.anosys.ai or any URL set by setup_tracing). The behavior is not obfuscated or using code-injection primitives, and it is likely intended for telemetry. However, because it transmits potentially sensitive data to a remote endpoint without filtering, redaction, or authentication and uses a hard-coded default endpoint, it represents a significant privacy and supply-chain risk if included unintentionally. Use only if you trust the destination and review what span attributes your instrumentation produces; otherwise consider removing or modifying it to redact sensitive fields and require explicit configuration.

gamoto

0.0.17

Live on pypi

Blocked by Socket

The module implements a Django management command that (if completed) would unconditionally spawn an interactive bash shell via os.system. This is a high-risk backdoor-like capability: while not directly exfiltrating data or contacting remote hosts, it grants full interactive command execution to anyone able to invoke the command. Remove or restrict such commands from production; require explicit access controls, avoid os.system for privileged actions, and prefer safer alternatives (e.g., non-interactive, audited administrative endpoints). The provided snippet is syntactically incomplete, so verify the real source for exact behavior before trusting this report.

zhmiscellany

5.9.0

Live on pypi

Blocked by Socket

This module implements a Discord token stealer and account-abuse toolkit. It enumerates LOCALAPPDATA and APPDATA to locate Discord and Chromium-based browser profiles, reads the “Local State” file to extract an encrypted master key, parses LevelDB files for strings prefixed with “dQw4w9WgXcQ:”, base64-decodes and AES-GCM-decrypts them via win32crypt.CryptUnprotectData to recover user tokens. Recovered tokens are validated by calling https://discordapp[.]com/api/v6/users/@me, then cached locally. The code exposes numerous functions that accept a user_token and perform actions on behalf of the victim—sending messages, adding reactions, generating invites, listing channels/guilds, fetching DM channels, etc.—via Discord API endpoints (e.g., https://discord[.]com/api/v9/...). This enables stealth credential theft, unauthorized account actions, and potential automated abuse if executed on a user’s system.

sbcli-dev

5.2.5

Live on pypi

Blocked by Socket

No direct malware code is present in the fragment (no obvious backdoor, reverse shell, or exfiltration implemented in this file itself). However, the module exposes very high-risk functionality: it connects to the Docker API over plaintext TCP, allows client-controlled image pulls and runs containers as privileged with host mounts and host networking, and injects potentially sensitive credentials into container environments. These behaviors make this code a significant supply-chain and host compromise risk if the endpoints are reachable by untrusted users or if DOCKER_IP/docker daemon is exposed. Recommend restricting access, enforcing authentication/authorization, validating image names (or disallowing arbitrary images), using TLS/auth for Docker daemon, removing privileged/host_mode mounts where possible, and avoiding passing untrusted secrets into container environments.

@aiyiran/myclaw

1.0.162

by aiyiran

Live on npm

Blocked by Socket

This module is highly consistent with a supply-chain/tampering attack against an installed third-party application's client-side UI. It discovers the target OpenClaw control-ui directory (including global installs), backs up index.html, injects new scripts into index.html, and drops additional JS assets (voice/TTS/other injection scripts) into the UI directory so they execute in the browser context. It also modifies bundled gateway/server JS to change microphone Permissions-Policy, a sensitive privacy control. Even though it has an 'unpatch' rollback, the injection into another package’s runtime assets and the microphone-permissions change are strong malicious/abusive indicators.

azure-graphrbac

6.9.2

Removed from npm

Blocked by Socket

Possible typosquat of [azure](https://socket.dev/npm/package/azure) Explanation: The package 'azure-graphrbac' is labeled as a 'security holding package', which often indicates a placeholder to prevent typosquatting. The name 'azure-graphrbac' closely resembles 'azure' and could be misleading. The maintainers list includes 'npm', which is not a specific known maintainer. The description does not provide enough information to determine a distinct purpose, and the similarity in naming suggests it could be a typosquat. azure-graphrbac is a security-holding package

Live on npm for 2 hours and 41 minutes before removal. Socket users were protected even while the package was live.

plengauer/thoth

fbb7fac83304e6e1a8f0d98f1e75e583b76a5e5c

Live on actions

Blocked by Socket

The script demonstrates highly invasive techniques (binary relocation, wrapper-based interception of shells and runtimes, aggressive telemetry setup) that can compromise CI integrity and supply-chain security. While telemetry goals may be legitimate, the execution model introduces persistent, cross-process hooks that could be exploited for data leakage or command manipulation. This requires rigorous provenance checks, source code audits, removal or hardening of binary injections, and constrained permissions before trusting in any public package or workflow. Treat as high risk until thoroughly vetted.

shipmenttrackingserv-paypal

19.0.2

by sazzy9087

Removed from npm

Blocked by Socket

The code is designed to collect and send sensitive system and package information to an untrusted domain without user consent, indicating a high risk of data exfiltration and potential malicious intent.

Live on npm for 27 days, 8 hours and 55 minutes before removal. Socket users were protected even while the package was live.

boss-career-ops

0.2.0

Removed from pypi

Blocked by Socket

This module is highly indicative of malicious remote-control/backdoor behavior in a Chrome extension context. It accepts untrusted WebSocket commands, steals .zhipin.com cookies, captures screenshots, manipulates/navigates the active tab, and most critically executes attacker-supplied JavaScript via new Function(params.script). All results are returned to the WebSocket peer with no authentication or authorization, making it a severe security risk and malware-like capability.

Live on pypi for 1 day, 21 hours and 26 minutes before removal. Socket users were protected even while the package was live.

shafa-bo

0.0.116

by binapm

Live on npm

Blocked by Socket

The package contains a hidden payload that targets Russian language users visiting Russian and Belarusian sites. For those users, it will disable user interaction and play a looping audio of the Ukrainian anthem after 3 days. Therefore, it is marked as protestware only because it freezes interactions for many users. This behavior is not disclosed in any documentation of the package and seriously disrupts user experience.

github.com/milvus-io/milvus

v0.10.3-0.20220128000114-d3d26b388dbb

Live on go

Blocked by Socket

This code implements an insecure, unauthenticated RPC mechanism that allows remote clients to cause arbitrary code execution and exfiltrate files/system information. Using pickle over an untrusted network and invoking methods by client-supplied names are severe supply-chain/backdoor risks. Do not deploy or reuse this code in production; it should be treated as a backdoor/untrusted remote-execution component unless wrapped with strong authentication, authorization, sandboxing, and safe serialization.

@emilgroup/setting-sdk

0.2.3

by cover42devs

Removed from npm

Blocked by Socket

The package will run index.js automatically on install. This behavior is potentially dangerous because index.js could perform malicious actions (data exfiltration, telemetry, system modification, spawning shells, running remote code). The package.json itself does not prove malware, but you must inspect index.js (and any code it loads) before installing or running in a privileged environment. If you cannot review the code, treat this as risky and avoid installing it in sensitive environments.

Live on npm for 3 days, 3 hours and 22 minutes before removal. Socket users were protected even while the package was live.

mb-netmgmt

0.0.19

Live on pypi

Blocked by Socket

The provided code contains significant security vulnerabilities, including unrestricted authentication and lack of host key verification, which could lead to unauthorized access and potential data theft. The use of a callback URL further raises concerns about data exfiltration. Overall, the code poses a high security risk and should be reviewed and refactored to include proper authentication and validation mechanisms.

github.com/u-root/u-root

v0.0.0-20180529204856-1ce66b07451f

Live on go

Blocked by Socket

This module is functionally a network-exposed SSH remote shell. After public-key authentication, it spawns an unrestricted interactive system shell in a PTY and relays the shell I/O over the SSH connection, enabling remote command execution on the host. Additional concerns include setting TERM in the server environment from untrusted client input and, in debug mode, logging potentially sensitive session content. No explicit stealth/exfiltration/persistence code is present in this file, but the capability itself is high-impact and strongly suspicious in a supply-chain context unless the deployment purpose and access controls are tightly governed.

pear-browser

1.2.4

by kubilaytr

Live on npm

Blocked by Socket

This extension background script implements a powerful remote control agent over a WebSocket to localhost. It can exfiltrate cookies, page source and screenshots, execute arbitrary code in any tab, manipulate cookies, upload files, and control tabs/windows and user input. Those capabilities enable credential theft, session hijacking, and actions performed on behalf of the user. If you do not explicitly trust the local controller and the origin of this extension, treat it as malicious or extremely risky. The code itself is not obfuscated, but its functionality is dangerous in typical threat models.

wixdevpoc

1.0.5

by tomi15

Removed from npm

Blocked by Socket

This script is designed to extract sensitive access tokens from a Google Cloud instance and send them to an external server, posing a significant security risk.

Live on npm for 13 days, 22 hours and 41 minutes before removal. Socket users were protected even while the package was live.

hackingtools

3.0.0.965

Live on pypi

Blocked by Socket

The code demonstrates high-risk behavior typical of dropper/packer-like workflows: encrypted payloads embedded in stubs, base64-wrapped code executed at runtime, and optional packaging into executables. While there are syntax anomalies and incomplete branches that prevent immediate execution, the overall pattern is aligned with covert payload delivery or supply-chain risk. Thorough review of the complete, verified source is required before use; treat as dangerous and isolate until confirmed safe.

fuzzer-gui

4.0.1

by softcom-ciber

Removed from npm

Blocked by Socket

The code is highly malicious, as it is designed to create a reverse shell that provides unauthorized remote access to a machine. It does not attempt to obfuscate its purpose or functionality, and poses a serious security risk.

Live on npm for 3 days, 16 hours and 14 minutes before removal. Socket users were protected even while the package was live.

kindly-guard-server

0.2.0

Live on cargo

Blocked by Socket

The provided fragment is a deliberately malicious payload containing credential harvesting, remote code execution (download-and-execute), multiple reverse-shell/backdoor techniques, exfiltration, defacement, and destructive commands. Execution would likely result in credential disclosure, full remote compromise, and potential permanent data loss. Treat as confirmed malware/backdoor and respond accordingly.

ai-dispatch

8.63.0

Live on cargo

Blocked by Socket

Significant supply-chain and runtime risk due to load_hooks() forcibly marking all hooks as trusted, combined with shell-based command execution and payload piping. If hooks.toml or CLI specs are compromised, attackers can execute arbitrary commands with access to task payloads. Improve by removing unconditional trust elevation, implementing provenance-based trust (e.g., digital signatures or origin checks), and replacing shell invocation with safer, explicit process execution with strict argument validation. Consider isolating hook execution and minimizing payload exposure to hooks.

bigdl-orca-spark3

2.5.0b20240316

Live on pypi

Blocked by Socket

The code contains potential security risks such as hard-coded file paths, subprocess.Popen usage, and the handling of untrusted data through PyArrow Plasma. It is essential to review and address these security concerns before using this code in a production environment.

ziplip

2.0.2

Live on pypi

Blocked by Socket

This script intentionally hides and immediately executes a large embedded payload via base64 decoding and sourcing. That pattern is high-risk and commonly used for malicious purposes (droppers, backdoors, stealthy installers). Without decoding the blob, exact behavior is unknown, but the execution technique and heavy obfuscation justify treating this file as dangerous. Do not execute; decode and fully audit the payload in a controlled sandbox before any use.

routersploit

3.4.7

Live on pypi

Blocked by Socket

The code implements a TCP bind shell, which poses a significant security risk due to its ability to execute arbitrary commands remotely without authentication. This functionality is often associated with malicious activities, such as unauthorized access and control over a system.

anosys-openai-agents-logger

0.0.24

Live on pypi

Blocked by Socket

This module implements an OpenTelemetry SpanExporter that extracts many span attributes (including LLM inputs/outputs and token counts) and posts them to an external URL (default https://www.anosys.ai or any URL set by setup_tracing). The behavior is not obfuscated or using code-injection primitives, and it is likely intended for telemetry. However, because it transmits potentially sensitive data to a remote endpoint without filtering, redaction, or authentication and uses a hard-coded default endpoint, it represents a significant privacy and supply-chain risk if included unintentionally. Use only if you trust the destination and review what span attributes your instrumentation produces; otherwise consider removing or modifying it to redact sensitive fields and require explicit configuration.

gamoto

0.0.17

Live on pypi

Blocked by Socket

The module implements a Django management command that (if completed) would unconditionally spawn an interactive bash shell via os.system. This is a high-risk backdoor-like capability: while not directly exfiltrating data or contacting remote hosts, it grants full interactive command execution to anyone able to invoke the command. Remove or restrict such commands from production; require explicit access controls, avoid os.system for privileged actions, and prefer safer alternatives (e.g., non-interactive, audited administrative endpoints). The provided snippet is syntactically incomplete, so verify the real source for exact behavior before trusting this report.

zhmiscellany

5.9.0

Live on pypi

Blocked by Socket

This module implements a Discord token stealer and account-abuse toolkit. It enumerates LOCALAPPDATA and APPDATA to locate Discord and Chromium-based browser profiles, reads the “Local State” file to extract an encrypted master key, parses LevelDB files for strings prefixed with “dQw4w9WgXcQ:”, base64-decodes and AES-GCM-decrypts them via win32crypt.CryptUnprotectData to recover user tokens. Recovered tokens are validated by calling https://discordapp[.]com/api/v6/users/@me, then cached locally. The code exposes numerous functions that accept a user_token and perform actions on behalf of the victim—sending messages, adding reactions, generating invites, listing channels/guilds, fetching DM channels, etc.—via Discord API endpoints (e.g., https://discord[.]com/api/v9/...). This enables stealth credential theft, unauthorized account actions, and potential automated abuse if executed on a user’s system.

sbcli-dev

5.2.5

Live on pypi

Blocked by Socket

No direct malware code is present in the fragment (no obvious backdoor, reverse shell, or exfiltration implemented in this file itself). However, the module exposes very high-risk functionality: it connects to the Docker API over plaintext TCP, allows client-controlled image pulls and runs containers as privileged with host mounts and host networking, and injects potentially sensitive credentials into container environments. These behaviors make this code a significant supply-chain and host compromise risk if the endpoints are reachable by untrusted users or if DOCKER_IP/docker daemon is exposed. Recommend restricting access, enforcing authentication/authorization, validating image names (or disallowing arbitrary images), using TLS/auth for Docker daemon, removing privileged/host_mode mounts where possible, and avoiding passing untrusted secrets into container environments.

@aiyiran/myclaw

1.0.162

by aiyiran

Live on npm

Blocked by Socket

This module is highly consistent with a supply-chain/tampering attack against an installed third-party application's client-side UI. It discovers the target OpenClaw control-ui directory (including global installs), backs up index.html, injects new scripts into index.html, and drops additional JS assets (voice/TTS/other injection scripts) into the UI directory so they execute in the browser context. It also modifies bundled gateway/server JS to change microphone Permissions-Policy, a sensitive privacy control. Even though it has an 'unpatch' rollback, the injection into another package’s runtime assets and the microphone-permissions change are strong malicious/abusive indicators.

azure-graphrbac

6.9.2

Removed from npm

Blocked by Socket

Possible typosquat of [azure](https://socket.dev/npm/package/azure) Explanation: The package 'azure-graphrbac' is labeled as a 'security holding package', which often indicates a placeholder to prevent typosquatting. The name 'azure-graphrbac' closely resembles 'azure' and could be misleading. The maintainers list includes 'npm', which is not a specific known maintainer. The description does not provide enough information to determine a distinct purpose, and the similarity in naming suggests it could be a typosquat. azure-graphrbac is a security-holding package

Live on npm for 2 hours and 41 minutes before removal. Socket users were protected even while the package was live.

plengauer/thoth

fbb7fac83304e6e1a8f0d98f1e75e583b76a5e5c

Live on actions

Blocked by Socket

The script demonstrates highly invasive techniques (binary relocation, wrapper-based interception of shells and runtimes, aggressive telemetry setup) that can compromise CI integrity and supply-chain security. While telemetry goals may be legitimate, the execution model introduces persistent, cross-process hooks that could be exploited for data leakage or command manipulation. This requires rigorous provenance checks, source code audits, removal or hardening of binary injections, and constrained permissions before trusting in any public package or workflow. Treat as high risk until thoroughly vetted.

shipmenttrackingserv-paypal

19.0.2

by sazzy9087

Removed from npm

Blocked by Socket

The code is designed to collect and send sensitive system and package information to an untrusted domain without user consent, indicating a high risk of data exfiltration and potential malicious intent.

Live on npm for 27 days, 8 hours and 55 minutes before removal. Socket users were protected even while the package was live.

boss-career-ops

0.2.0

Removed from pypi

Blocked by Socket

This module is highly indicative of malicious remote-control/backdoor behavior in a Chrome extension context. It accepts untrusted WebSocket commands, steals .zhipin.com cookies, captures screenshots, manipulates/navigates the active tab, and most critically executes attacker-supplied JavaScript via new Function(params.script). All results are returned to the WebSocket peer with no authentication or authorization, making it a severe security risk and malware-like capability.

Live on pypi for 1 day, 21 hours and 26 minutes before removal. Socket users were protected even while the package was live.

shafa-bo

0.0.116

by binapm

Live on npm

Blocked by Socket

The package contains a hidden payload that targets Russian language users visiting Russian and Belarusian sites. For those users, it will disable user interaction and play a looping audio of the Ukrainian anthem after 3 days. Therefore, it is marked as protestware only because it freezes interactions for many users. This behavior is not disclosed in any documentation of the package and seriously disrupts user experience.

github.com/milvus-io/milvus

v0.10.3-0.20220128000114-d3d26b388dbb

Live on go

Blocked by Socket

This code implements an insecure, unauthenticated RPC mechanism that allows remote clients to cause arbitrary code execution and exfiltrate files/system information. Using pickle over an untrusted network and invoking methods by client-supplied names are severe supply-chain/backdoor risks. Do not deploy or reuse this code in production; it should be treated as a backdoor/untrusted remote-execution component unless wrapped with strong authentication, authorization, sandboxing, and safe serialization.

@emilgroup/setting-sdk

0.2.3

by cover42devs

Removed from npm

Blocked by Socket

The package will run index.js automatically on install. This behavior is potentially dangerous because index.js could perform malicious actions (data exfiltration, telemetry, system modification, spawning shells, running remote code). The package.json itself does not prove malware, but you must inspect index.js (and any code it loads) before installing or running in a privileged environment. If you cannot review the code, treat this as risky and avoid installing it in sensitive environments.

Live on npm for 3 days, 3 hours and 22 minutes before removal. Socket users were protected even while the package was live.

mb-netmgmt

0.0.19

Live on pypi

Blocked by Socket

The provided code contains significant security vulnerabilities, including unrestricted authentication and lack of host key verification, which could lead to unauthorized access and potential data theft. The use of a callback URL further raises concerns about data exfiltration. Overall, the code poses a high security risk and should be reviewed and refactored to include proper authentication and validation mechanisms.

github.com/u-root/u-root

v0.0.0-20180529204856-1ce66b07451f

Live on go

Blocked by Socket

This module is functionally a network-exposed SSH remote shell. After public-key authentication, it spawns an unrestricted interactive system shell in a PTY and relays the shell I/O over the SSH connection, enabling remote command execution on the host. Additional concerns include setting TERM in the server environment from untrusted client input and, in debug mode, logging potentially sensitive session content. No explicit stealth/exfiltration/persistence code is present in this file, but the capability itself is high-impact and strongly suspicious in a supply-chain context unless the deployment purpose and access controls are tightly governed.

pear-browser

1.2.4

by kubilaytr

Live on npm

Blocked by Socket

This extension background script implements a powerful remote control agent over a WebSocket to localhost. It can exfiltrate cookies, page source and screenshots, execute arbitrary code in any tab, manipulate cookies, upload files, and control tabs/windows and user input. Those capabilities enable credential theft, session hijacking, and actions performed on behalf of the user. If you do not explicitly trust the local controller and the origin of this extension, treat it as malicious or extremely risky. The code itself is not obfuscated, but its functionality is dangerous in typical threat models.

wixdevpoc

1.0.5

by tomi15

Removed from npm

Blocked by Socket

This script is designed to extract sensitive access tokens from a Google Cloud instance and send them to an external server, posing a significant security risk.

Live on npm for 13 days, 22 hours and 41 minutes before removal. Socket users were protected even while the package was live.

hackingtools

3.0.0.965

Live on pypi

Blocked by Socket

The code demonstrates high-risk behavior typical of dropper/packer-like workflows: encrypted payloads embedded in stubs, base64-wrapped code executed at runtime, and optional packaging into executables. While there are syntax anomalies and incomplete branches that prevent immediate execution, the overall pattern is aligned with covert payload delivery or supply-chain risk. Thorough review of the complete, verified source is required before use; treat as dangerous and isolate until confirmed safe.

fuzzer-gui

4.0.1

by softcom-ciber

Removed from npm

Blocked by Socket

The code is highly malicious, as it is designed to create a reverse shell that provides unauthorized remote access to a machine. It does not attempt to obfuscate its purpose or functionality, and poses a serious security risk.

Live on npm for 3 days, 16 hours and 14 minutes before removal. Socket users were protected even while the package was live.

kindly-guard-server

0.2.0

Live on cargo

Blocked by Socket

The provided fragment is a deliberately malicious payload containing credential harvesting, remote code execution (download-and-execute), multiple reverse-shell/backdoor techniques, exfiltration, defacement, and destructive commands. Execution would likely result in credential disclosure, full remote compromise, and potential permanent data loss. Treat as confirmed malware/backdoor and respond accordingly.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Git dependency

GitHub dependency

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

Telemetry

Protestware or potentially unwanted behavior

Unstable ownership

55 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a Demo

Questions? Call us at (844) SOCKET-0

Read the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles