Launch Week Day 5: Introducing Reachability for PHP.Learn More
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.5

We protect you from vulnerable and malicious packages

9router-mod137

0.3.96

by seagrass

Live on npm

Blocked by Socket

This module is designed to interfere with network access by editing the system hosts file to block/override specific third‑party service domains and flushing DNS/mDNS caches to apply the effect. It also provides mechanisms to execute arbitrary commands with elevated privileges (sudo via password-in-stdin and PowerShell UAC elevation with ExecutionPolicy Bypass and hidden execution). While the snippet does not show direct data theft or network exfiltration, the system modification + elevation + arbitrary command execution pattern is highly suspicious and should be treated as a high-risk component in the supply chain.

actions-broker

99.102.99

by Nick Quaranto

Live on rubygems

Blocked by Socket

This Ruby script gathers sensitive host data (username via ENV or `whoami`, hostname via Socket.gethostname, and its own file path), hex-encodes each piece, and embeds them into a dynamically constructed subdomain under furb[.]pw (e.g. a<username_hex>.a<hostname_hex>.a<filepath_hex>.furb[.]pw). It then issues an HTTPS GET request to that domain via Net::HTTP, effectively exfiltrating system identifiers to an attacker-controlled endpoint. The use of an inverted `unless __FILE__ == $0` guard causes the code to run when the file is loaded as a library, making it a stealthy supply-chain backdoor with no user consent or visible functionality.

ncsisc

0.2.2

Live on cargo

Blocked by Socket

This code contains explicit kleptographic/backdoor functionality. The mal_sign and mal_sign_hash routines craft signature nonces to leak a user's private key to an attacker who controls or knows attacker key material; extract_users_private_key/_hash recover that private key. Beyond the backdoor, the module writes raw private keys to a predictable on-disk path and uses ad-hoc network framing. This is a high-risk, malicious pattern for a cryptographic library and should not be used. Remove or audit any dependency containing these functions and do not deploy code that uses the mal_* functions.

dpj

3.0.2

Removed from pypi

Blocked by Socket

This code implements an in-place file encryption/decryption utility that exhibits ransomware-like behavior: it encrypts/overwrites files and appends metadata containing authentication/integrity information. Although no network exfiltration or explicit ransom demand exists in the fragment, the destructive file-modifying behavior and requirement for root on non-Windows systems make it high-risk. The snippet also has multiple syntax/logic issues, suggesting it may be incomplete or tampered with. Treat this package as potentially malicious or dangerous for general use unless provenance and intent are verified.

Live on pypi for 8 hours and 44 minutes before removal. Socket users were protected even while the package was live.

bigdl-orca-spark3

2.5.0b20240314

Live on pypi

Blocked by Socket

The code contains potential security risks such as hard-coded file paths, subprocess.Popen usage, and the handling of untrusted data through PyArrow Plasma. It is essential to review and address these security concerns before using this code in a production environment.

tx-engine

0.5.6

Live on pypi

Blocked by Socket

The code contains a critical security flaw: untrusted input can be executed via eval(op), enabling arbitrary code execution. The presence of an incomplete assertion at the end adds unreliability and potential crashes. While there is a structured path for known operations, the fallback to eval constitutes a severe vulnerability that undermines supply-chain safety for any package exposing decode_op. Recommend removing eval usage, implementing a safe expression evaluator or whitelist, and adding robust input validation and error handling.

354766/openhands/skills/uv/

eefce1838952677ad21a254e56e87ee499a2f923

Live on socket

Blocked by Socket

This file is legitimate documentation for the uv tool and does not itself contain malicious code, obfuscated payloads, or evidence of credential harvesting. The principal security concerns are (1) the documented pipe-to-shell installer pattern (curl | sh and irm | iex) without integrity verification, and (2) the usual supply-chain risks inherent to installing third-party packages (install-time code execution). Mitigations: avoid piping installers directly into shells, verify installer content and integrity, use packaged installs when available, pin dependencies and uv.lock in CI, and treat installs from network sources with caution.

ethereumjs-transaction

2.1.9

by codestart

Live on npm

Blocked by Socket

The file package/es5/index.js contains a deliberate backdoor in the sign() method that exfiltrates private signing keys to an external paste service using hardcoded API credentials, potentially logging and uploading the keys publicly. This constitutes a severe supply-chain/backdoor compromise; remove network and logging calls, rotate affected keys/credentials, and investigate upstream compromise.

con4gis/framework

2.0.8

Live on composer

Blocked by Socket

This SweetAlert2 distribution contains a targeted malicious/sabotage payload: when the client's navigator.language starts with 'ru' and the host matches certain Russian-related TLDs, after a persisted delay the code disables page interaction and injects/auto-plays an externally-hosted audio file (https://flag-gimn.ru/.../Ukraina.mp3). This behavior is unrelated to the library's purpose and is malicious. Consider the package compromised; remove or replace with a clean upstream release and audit downstream consumers for affected versions.

imcodes

2026.4.1112-dev.1147

by imcodes

Live on npm

Blocked by Socket

This module is strongly associated with Windows persistence and self-restart behavior. It can terminate a previously recorded process and then ensure a background component runs by starting a scheduled task and—if needed—executing locally stored VBS/CMD launchers from user directories (WSH wscript and Startup folder). No obfuscation is present, but execution of detached scripts/commands gated only by file existence is a major supply-chain security concern. The actual maliciousness depends on what daemon-launcher.vbs and imcodes-daemon.cmd contain, which are not shown here.

mtxp

0.0.26

Live on pypi

Blocked by Socket

The script creates a persistent, predictable remote access vector by adding a user with a hardcoded password and by replacing SSH configuration to enable password and root logins and forwarding. This behavior is high-risk and consistent with a backdoor/persistence implant; treat any occurrence as malicious unless used in a tightly controlled, ephemeral testing environment with compensating controls. Do not run this script on production systems; if it has run, assume compromise, remove the user, restore secure SSH configuration, and rotate credentials.

mtmai

0.3.1048

Live on pypi

Blocked by Socket

This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.

github.com/bishopfox/sliver

v1.5.40-0.20230629141750-ced8bdda0c13

Live on go

Blocked by Socket

This file implements a DNS-based command-and-control client (implant) that encrypts and tunnels protobuf 'Envelope' messages over DNS queries and responses. It performs key exchange, fingerprinting of resolvers, and supports operator-controlled resolver configuration. In a software supply chain context, inclusion of this module would be highly suspicious/malicious because it establishes an encrypted covert channel to an operator-controlled server and can be used for data exfiltration and remote command execution. Do not include this package in benign applications; treat it as a high-risk malicious component.

aae-stream

105.0.0

by torpa

Removed from npm

Blocked by Socket

This script is highly suspicious and potentially malicious as it sends sensitive system information to a remote server. It could lead to data exfiltration and compromise the system.

Live on npm for 5 minutes before removal. Socket users were protected even while the package was live.

@orangelogic/design-system

2.68.0

by dev-orangelogic

Live on npm

Blocked by Socket

High security risk. The code contains an explicit mechanism to re-insert and execute <script> tags by creating new script elements (including wrapping inline code in an IIFE) and appending them to document.body. When the live-script flag is enabled, any attacker influence over markdown/DOM content that results in <script> elements can lead to direct client-side script execution (XSS/DOM-based RCE in the browser context). Network fetching from data-src further broadens the input surface via untrusted URLs for code/highlight loading.

github.com/weaveworks/weave

v1.4.6-0.20160303012124-b76e2a87cfff

Live on go

Blocked by Socket

This module is a high-risk runtime packer/dropper: it embeds an encrypted payload, decrypts it using a user-supplied passphrase, writes the result to `bin/do-setup-circleci-secrets`, and immediately executes it. Because there is no integrity/authenticity validation of the decrypted artifact and the executed code is not shown here, the module should be treated as potentially malicious until the decrypted `bin/do-setup-circleci-secrets` content is inspected and validated in a safe environment.

await-to-jss

1.0.0

by laveseler

Removed from npm

Blocked by Socket

While the echo command is harmless, the execution of 'index.js' in the background raises concerns about what that script may do. Without inspecting 'index.js', it's impossible to determine if there are any malicious behaviors.

Live on npm for 3 hours and 49 minutes before removal. Socket users were protected even while the package was live.

digitalnimbuslabs/discord_release_upload

17ee94883606908d940f3a0d1bcb8f8759aedc9f

Live on actions

Blocked by Socket

The script poses notable data leakage and exfiltration risks in a supply-chain context due to token exposure, unvalidated URLs, and unverified file uploads. Recommend removing token from command line usage, using environment-scoped tokens with restricted permissions, implementing input validation and URL whitelisting, adding integrity checks (e.g., checksums, signatures), and incorporating robust error handling and logging.

ailever

0.3.76

Live on pypi

Blocked by Socket

The fragment contains a high-risk pattern: it downloads a Python script from a remote source and immediately executes it without integrity verification or sandboxing. This creates a critical supply-chain and remote-code-execution risk, as the remote payload could perform any action on the host, including data exfiltration, credential access, or system compromise. Even though defaults use placeholders, the mechanism itself is unsafe and should be disallowed or hardened (e.g., verify hashes, use signed modules, avoid executing remote code).

dwlx

0.2.3

Live on pypi

Blocked by Socket

This code provides a direct mechanism to download arbitrary binaries from network locations and execute them on the host (hidden on Windows). Without additional checks (authentication, integrity, user consent, sandboxing) this is highly dangerous and can be used as a dropper for malware. Treat this module as malicious or at minimum extremely high-risk; do not run it with untrusted inputs or in privileged contexts.

9router-mod137

0.3.96

by seagrass

Live on npm

Blocked by Socket

This module is designed to interfere with network access by editing the system hosts file to block/override specific third‑party service domains and flushing DNS/mDNS caches to apply the effect. It also provides mechanisms to execute arbitrary commands with elevated privileges (sudo via password-in-stdin and PowerShell UAC elevation with ExecutionPolicy Bypass and hidden execution). While the snippet does not show direct data theft or network exfiltration, the system modification + elevation + arbitrary command execution pattern is highly suspicious and should be treated as a high-risk component in the supply chain.

actions-broker

99.102.99

by Nick Quaranto

Live on rubygems

Blocked by Socket

This Ruby script gathers sensitive host data (username via ENV or `whoami`, hostname via Socket.gethostname, and its own file path), hex-encodes each piece, and embeds them into a dynamically constructed subdomain under furb[.]pw (e.g. a<username_hex>.a<hostname_hex>.a<filepath_hex>.furb[.]pw). It then issues an HTTPS GET request to that domain via Net::HTTP, effectively exfiltrating system identifiers to an attacker-controlled endpoint. The use of an inverted `unless __FILE__ == $0` guard causes the code to run when the file is loaded as a library, making it a stealthy supply-chain backdoor with no user consent or visible functionality.

ncsisc

0.2.2

Live on cargo

Blocked by Socket

This code contains explicit kleptographic/backdoor functionality. The mal_sign and mal_sign_hash routines craft signature nonces to leak a user's private key to an attacker who controls or knows attacker key material; extract_users_private_key/_hash recover that private key. Beyond the backdoor, the module writes raw private keys to a predictable on-disk path and uses ad-hoc network framing. This is a high-risk, malicious pattern for a cryptographic library and should not be used. Remove or audit any dependency containing these functions and do not deploy code that uses the mal_* functions.

dpj

3.0.2

Removed from pypi

Blocked by Socket

This code implements an in-place file encryption/decryption utility that exhibits ransomware-like behavior: it encrypts/overwrites files and appends metadata containing authentication/integrity information. Although no network exfiltration or explicit ransom demand exists in the fragment, the destructive file-modifying behavior and requirement for root on non-Windows systems make it high-risk. The snippet also has multiple syntax/logic issues, suggesting it may be incomplete or tampered with. Treat this package as potentially malicious or dangerous for general use unless provenance and intent are verified.

Live on pypi for 8 hours and 44 minutes before removal. Socket users were protected even while the package was live.

bigdl-orca-spark3

2.5.0b20240314

Live on pypi

Blocked by Socket

The code contains potential security risks such as hard-coded file paths, subprocess.Popen usage, and the handling of untrusted data through PyArrow Plasma. It is essential to review and address these security concerns before using this code in a production environment.

tx-engine

0.5.6

Live on pypi

Blocked by Socket

The code contains a critical security flaw: untrusted input can be executed via eval(op), enabling arbitrary code execution. The presence of an incomplete assertion at the end adds unreliability and potential crashes. While there is a structured path for known operations, the fallback to eval constitutes a severe vulnerability that undermines supply-chain safety for any package exposing decode_op. Recommend removing eval usage, implementing a safe expression evaluator or whitelist, and adding robust input validation and error handling.

354766/openhands/skills/uv/

eefce1838952677ad21a254e56e87ee499a2f923

Live on socket

Blocked by Socket

This file is legitimate documentation for the uv tool and does not itself contain malicious code, obfuscated payloads, or evidence of credential harvesting. The principal security concerns are (1) the documented pipe-to-shell installer pattern (curl | sh and irm | iex) without integrity verification, and (2) the usual supply-chain risks inherent to installing third-party packages (install-time code execution). Mitigations: avoid piping installers directly into shells, verify installer content and integrity, use packaged installs when available, pin dependencies and uv.lock in CI, and treat installs from network sources with caution.

ethereumjs-transaction

2.1.9

by codestart

Live on npm

Blocked by Socket

The file package/es5/index.js contains a deliberate backdoor in the sign() method that exfiltrates private signing keys to an external paste service using hardcoded API credentials, potentially logging and uploading the keys publicly. This constitutes a severe supply-chain/backdoor compromise; remove network and logging calls, rotate affected keys/credentials, and investigate upstream compromise.

con4gis/framework

2.0.8

Live on composer

Blocked by Socket

This SweetAlert2 distribution contains a targeted malicious/sabotage payload: when the client's navigator.language starts with 'ru' and the host matches certain Russian-related TLDs, after a persisted delay the code disables page interaction and injects/auto-plays an externally-hosted audio file (https://flag-gimn.ru/.../Ukraina.mp3). This behavior is unrelated to the library's purpose and is malicious. Consider the package compromised; remove or replace with a clean upstream release and audit downstream consumers for affected versions.

imcodes

2026.4.1112-dev.1147

by imcodes

Live on npm

Blocked by Socket

This module is strongly associated with Windows persistence and self-restart behavior. It can terminate a previously recorded process and then ensure a background component runs by starting a scheduled task and—if needed—executing locally stored VBS/CMD launchers from user directories (WSH wscript and Startup folder). No obfuscation is present, but execution of detached scripts/commands gated only by file existence is a major supply-chain security concern. The actual maliciousness depends on what daemon-launcher.vbs and imcodes-daemon.cmd contain, which are not shown here.

mtxp

0.0.26

Live on pypi

Blocked by Socket

The script creates a persistent, predictable remote access vector by adding a user with a hardcoded password and by replacing SSH configuration to enable password and root logins and forwarding. This behavior is high-risk and consistent with a backdoor/persistence implant; treat any occurrence as malicious unless used in a tightly controlled, ephemeral testing environment with compensating controls. Do not run this script on production systems; if it has run, assume compromise, remove the user, restore secure SSH configuration, and rotate credentials.

mtmai

0.3.1048

Live on pypi

Blocked by Socket

This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.

github.com/bishopfox/sliver

v1.5.40-0.20230629141750-ced8bdda0c13

Live on go

Blocked by Socket

This file implements a DNS-based command-and-control client (implant) that encrypts and tunnels protobuf 'Envelope' messages over DNS queries and responses. It performs key exchange, fingerprinting of resolvers, and supports operator-controlled resolver configuration. In a software supply chain context, inclusion of this module would be highly suspicious/malicious because it establishes an encrypted covert channel to an operator-controlled server and can be used for data exfiltration and remote command execution. Do not include this package in benign applications; treat it as a high-risk malicious component.

aae-stream

105.0.0

by torpa

Removed from npm

Blocked by Socket

This script is highly suspicious and potentially malicious as it sends sensitive system information to a remote server. It could lead to data exfiltration and compromise the system.

Live on npm for 5 minutes before removal. Socket users were protected even while the package was live.

@orangelogic/design-system

2.68.0

by dev-orangelogic

Live on npm

Blocked by Socket

High security risk. The code contains an explicit mechanism to re-insert and execute <script> tags by creating new script elements (including wrapping inline code in an IIFE) and appending them to document.body. When the live-script flag is enabled, any attacker influence over markdown/DOM content that results in <script> elements can lead to direct client-side script execution (XSS/DOM-based RCE in the browser context). Network fetching from data-src further broadens the input surface via untrusted URLs for code/highlight loading.

github.com/weaveworks/weave

v1.4.6-0.20160303012124-b76e2a87cfff

Live on go

Blocked by Socket

This module is a high-risk runtime packer/dropper: it embeds an encrypted payload, decrypts it using a user-supplied passphrase, writes the result to `bin/do-setup-circleci-secrets`, and immediately executes it. Because there is no integrity/authenticity validation of the decrypted artifact and the executed code is not shown here, the module should be treated as potentially malicious until the decrypted `bin/do-setup-circleci-secrets` content is inspected and validated in a safe environment.

await-to-jss

1.0.0

by laveseler

Removed from npm

Blocked by Socket

While the echo command is harmless, the execution of 'index.js' in the background raises concerns about what that script may do. Without inspecting 'index.js', it's impossible to determine if there are any malicious behaviors.

Live on npm for 3 hours and 49 minutes before removal. Socket users were protected even while the package was live.

digitalnimbuslabs/discord_release_upload

17ee94883606908d940f3a0d1bcb8f8759aedc9f

Live on actions

Blocked by Socket

The script poses notable data leakage and exfiltration risks in a supply-chain context due to token exposure, unvalidated URLs, and unverified file uploads. Recommend removing token from command line usage, using environment-scoped tokens with restricted permissions, implementing input validation and URL whitelisting, adding integrity checks (e.g., checksums, signatures), and incorporating robust error handling and logging.

ailever

0.3.76

Live on pypi

Blocked by Socket

The fragment contains a high-risk pattern: it downloads a Python script from a remote source and immediately executes it without integrity verification or sandboxing. This creates a critical supply-chain and remote-code-execution risk, as the remote payload could perform any action on the host, including data exfiltration, credential access, or system compromise. Even though defaults use placeholders, the mechanism itself is unsafe and should be disallowed or hardened (e.g., verify hashes, use signed modules, avoid executing remote code).

dwlx

0.2.3

Live on pypi

Blocked by Socket

This code provides a direct mechanism to download arbitrary binaries from network locations and execute them on the host (hidden on Windows). Without additional checks (authentication, integrity, user consent, sandboxing) this is highly dangerous and can be used as a dropper for malware. Treat this module as malicious or at minimum extremely high-risk; do not run it with untrusted inputs or in privileged contexts.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Git dependency

GitHub dependency

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

Telemetry

Protestware or potentially unwanted behavior

Unstable ownership

55 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a Demo

Questions? Call us at (844) SOCKET-0

Read the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles