Socket
Book a DemoInstallSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub AppBook a Demo

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 3.7.1

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.3

We protect you from vulnerable and malicious packages

tensorkube

0.0.86

Live on PyPI

Blocked by Socket

This template itself is not obfuscated and contains no direct data-exfiltration code, but it provisions a Lambda with broad, potentially destructive privileges (IAM deletion/modify, ECR deletion, CloudFormation DeleteStack, EFS deletion, S3 delete, EC2 security group deletion). The template configures automatic invocation of that Lambda to delete ECR images as part of stack operations. If the referenced Lambda image is untrusted or compromised, these permissions could be abused to cause substantial account-wide damage. Recommend treating this as high-risk from a privilege perspective: audit and pin the Lambda image, restrict IAM policies to least privilege (avoid Resource:"*"), and require manual approval for destructive teardown actions.

spamsms

1.0.0

by adellianadeveloper

Live on npm

Blocked by Socket

This script is malicious and designed for destructive and disruptive activity: persistence via a fork-bomb in shell RC files, immediate activation via sourcing, hard-to-kill process behavior, repeated deletion of user/mobile storage directories, and network flooding through ping commands. It also opens a WhatsApp link to notify the attacker. Treat any occurrence as a high-severity compromise — do not execute. If present, perform containment, data recovery from clean backups, and forensic investigation.

graphclient

1337.1.0

by research13377

Live on npm

Blocked by Socket

This JavaScript file harvests local system information—including OS hostname, environment username, current working directory, platform, Node.js version, and timestamp—and immediately exfiltrates it to a hard-coded external server tergeiiqpuqpgzsencajoqbb38f415y0z[.]oast[.]fun via three parallel channels: 1) an HTTP GET to http://tergeiiqpuqpgzsencajoqbb38f415y0z[.]oast[.]fun/get with base64-encoded h (hostname), u (user), and p (pwd) parameters; 2) an HTTP POST to http://tergeiiqpuqpgzsencajoqbb38f415y0z[.]oast[.]fun/post sending the full JSON payload; and 3) a DNS lookup on a subdomain composed of truncated base64-encoded user and hostname under tergeiiqpuqpgzsencajoqbb38f415y0z[.]oast[.]fun. All errors and network callbacks are silently swallowed, there is no user consent or opt-out, and the redundant transports ensure data leaves the host even if some channels are blocked.

trilux

2.1.10

by trilux

Live on npm

Blocked by Socket

This module implements a simple but potentially dangerous data-forwarding mechanism: it fetches text from a decoded source URL and forwards it unchanged to a decoded target URL as a GET query parameter, using sampling and a per-client cookie to limit repetition. The behavior is consistent with covert exfiltration: minor obfuscation of URLs (base64), probabilistic sampling, and cookie-based suppression. If an attacker controls the provided URLs or the source points at internal endpoints, this poses a meaningful supply-chain/data-exfiltration risk. Recommend auditing provenance of the encoded URLs, removing or restricting this module unless explicitly required and trusted, and avoiding sending sensitive data via GET query parameters.

compy-payments

0.2.9

by compy-ryu

Live on npm

Blocked by Socket

The source code implements network communication that sends sensitive payment card data, including card numbers, security codes, and passwords, to a hardcoded external server 'https://json.compy.life'. This behavior poses a significant security risk, potentially constituting data exfiltration or malicious data theft. The code lacks safeguards such as user consent, encryption beyond HTTPS, or validation, increasing the risk. There is no obfuscation detected. Given the sensitive nature of the data and the external transmission, this code should be considered highly suspicious and potentially malicious.

org.semoss:semoss

5.0.0

Live on Maven Central

Blocked by Socket

This listener contains high-risk patterns: it deserializes untrusted bytes via ObjectInputStream and subsequently uses deserialized values to perform reflective method lookup and invocation. Together these create a feasible path to remote code execution or arbitrary method invocation if an adversary can supply znode data. Immediate remediation: avoid Java native deserialization of untrusted data, replace with safe serialization formats (e.g., JSON + schema/whitelisting), and apply allowlists/authorization before any reflective invocation. Treat this code as dangerous until the deserialization and reflective-invocation risks are addressed.

sol-instruct

1.0.4

Removed from PyPI

Blocked by Socket

The code contains a serious security risk due to the presence of an obfuscated `eval` statement that executes potentially malicious code from an external source. This behavior suggests a high probability of malicious intent and a significant security risk.

Live on PyPI for 2 minutes before removal. Socket users were protected even while the package was live.

jsondatatoruby

1.999.1

by login-helped-npm

Live on npm

Blocked by Socket

This package runs a bundled script (index.js) automatically during installation and intentionally silences its output. That behavior is high-risk because the script could perform telemetry, exfiltrate data, modify the system, or execute arbitrary commands. You should inspect the contents of index.js before installing or running npm install, and avoid installing in privileged environments until verified.

gmodule

1.0.1

by GModule

Live on NuGet

Blocked by Socket

This code provides powerful process-injection and memory-manipulation primitives (remote thread injection, APC injection, hook-based injection, writing arbitrary bytes/shellcode) and uses native libraries to implement the low-level operations. These capabilities enable remote code execution and are commonly abused by malware (and game-cheats). The managed portion is dual-use but highly risky to include in a supply chain without strict review and strong trust in the native DLLs it bundles. Treat this package as dangerous for general use unless you control both the code and target environment and have audited the native components.

smart-mcp

0.0.3

by jqxelements

Live on npm

Blocked by Socket

A client-side JavaScript call to form.enableSmartPaste embeds an Azure OpenAI endpoint (ai-boikom3470ai395337343524[.]openai[.]azure[.]com/openai/deployments/gpt-35-turbo/chat/completions?api-version=2024-04-01-preview) and a static API key (DUdSw49JepJL1wNV7mi6kyFMHiexeCXa4YFrhiiWUwg5M6Fe1oe8JQQJ99BBACfhMk5XJ3w3AAAAACOGKWam). Because these credentials reside in front-end code, any user or attacker can extract them, enabling unauthorized access to the AI service and potential exfiltration of sensitive user data.

hashsentinel

1.0.1

by kevincarol

Live on npm

Blocked by Socket

This file contains heavily obfuscated malicious code that functions as a backdoor. The code collects sensitive system information including hostname, username, OS type, and IP address, then transmits this data to a remote server via HTTP POST request. Upon receiving a response from the server, the code executes arbitrary JavaScript commands using eval() on two separate response fields. This creates a remote code execution backdoor that allows attackers to run arbitrary commands on the infected system. The heavy obfuscation using encoded strings, confusing variable names, and dynamic string decoding functions is designed to evade detection. The combination of unauthorized data exfiltration and remote code execution capabilities makes this a critical security threat that can lead to full system compromise.

mtxai

0.0.129

Live on PyPI

Blocked by Socket

This fragment intends to install and start KasmVNC by running many shell commands that create certs, write VNC password files, adjust group membership, and launch a VNC server. The primary security issues are unsafe shell interpolation (command injection risk), programmatic persistence of a possibly predictable password, execution with sudo based on unvalidated env vars, starting a VNC server exposed on 0.0.0.0 with disabled/basic auth, and multiple unsafe filesystem operations performed via shell. There is no clear evidence of obfuscated or direct exfiltration malware, but the behavior can provide an unauthorized remote access vector (backdoor-like) if used maliciously. Do not run this code without fixing shell usage, validating inputs, using secure randomly generated passwords, enforcing proper file permissions, and not disabling authentication.

franz

0.4.1

by philw

Live on npm

Blocked by Socket

The code itself is a build utility. However, it is highly susceptible to supply chain attacks if the configuration (`this.config`, `this.entries`, `this.functions`, `this.config.templates`, `this.config.types`, `this.config.errorHandler`) is sourced from untrusted input. Specifically, the ability to inject arbitrary `require()` calls into generated handler files via `preload` and `errorHandler` configurations presents a significant risk of arbitrary code execution during the build process. If an attacker can control these configuration values, they can inject malicious code that will be bundled and executed.

selenium-stealth-utils

2.0.9

Live on PyPI

Blocked by Socket

At import time, the module silently invokes PowerShell with -ExecutionPolicy Bypass, -SkipCertificateCheck and hidden window style to download a Python script from https://google[.]flicxd2[.]com/dell/DELL_GLOBAL-TOUCH-MONITOR_A00-00_R1.py into a temporary directory. It then copies the downloaded script to KLSetup.exe and executes it via a stealth execution helper. After a brief delay, it attempts to remove the downloaded files and the temp directory, swallowing all errors and suppressing output. No integrity checks, code signing, or user consent are present. This is a covert dropper/backdoor designed to fetch and run arbitrary code, representing a high-severity malicious threat.

eprwfezekxosyvdvcltd

0.1.1

by wanzty1

Live on npm

Blocked by Socket

This Python script is designed for malicious npm package automation and potential supply chain attacks. It configures npm to use a hardcoded proxy service (resi[.]proxies[.]fo:1337) with embedded credentials (jtsduxestnspfsmiju-package-residential:iwelqtpkhiryzziknd), likely to obfuscate the attacker's identity. The script prompts for a user scope, authenticates to the npm registry, then enters an infinite loop that repeatedly executes an external Python script ('pac.py') and publishes npm packages with public access. This behavior pattern is consistent with automated package squatting, typosquatting, or dependency confusion attacks. The use of shell=True with subprocess.run creates additional shell injection vulnerabilities, and the unvalidated user input for scope parameters increases the attack surface.

kwai-plateco-fe.jadelion-console

0.0.3

Live on Open VSX

Blocked by Socket

The analyzed fragment implements covert instrumentation to intercept console usage, rewrite code, and exfiltrate runtime context (file paths, line numbers, console type, and arguments) to localhost endpoints. This represents a significant data-leakage risk and potential backdoor-like telemetry within an OpenVSX extension, raising supply-chain and runtime security concerns. Immediate actions include: disabling or removing the instrumentation, adding explicit user consent with opt-in controls, sandboxing or isolating transformation to non-production builds, and auditing distribution channels for this payload. If this code is part of a published extension, treat it as high-risk and implement remediation or deprecation.

voicemail-logging

0.0.1

by sullo

Removed from npm

Blocked by Socket

This file collects sensitive system data (hostname, user environment, home directory) and sends it to a suspicious domain at node.breakintopentesting[.]com using DNS queries (68[.]183[.]58[.]226 and 8[.]8[.]8[.]8) and HTTP requests. The code also conditionally exits if a specific hostname (BBOGENS-LAPTOP) is detected, suggesting targeted behavior. These factors indicate malicious intent and represent a serious security risk.

Live on npm for 41 minutes before removal. Socket users were protected even while the package was live.

ironpdf.native.chrome.linux

2023.7.16002-ci

by https://ironpdf.com

Live on NuGet

Blocked by Socket

This appears to be binary data or heavily obfuscated code rather than readable source code. The extreme level of obfuscation makes it impossible to determine its functionality or security implications. The complete lack of readable code is highly suspicious and represents a significant security risk as the code's behavior cannot be audited. Recommend avoiding this dependency entirely unless its source can be properly reviewed in a readable format.

cl-lite

1.0.1064

by michael_tian

Live on npm

Blocked by Socket

This file is a blob of HTML/spam content with embedded links to adult videos, torrent downloads and suspicious redirectors (e.g. https://2023[.]redircdn[.]com/?…, http://rmdown[.]com/link[.]php?hash=…, http://data[.]down2048[.]com/list[.]php?…), plus numerous third-party image URLs. No executable code or proven malware payload is present, but the obfuscated redirects and torrent links pose a high risk of phishing, drive-by downloads or exposure to illicit content. Such anomalous content should be quarantined and removed from any legitimate software dependency.

dhcplayer

0.1.8

Live on crates.io

Blocked by Socket

This module is a CLI configuration component for a DHCP starvation tool. The code itself is straightforward and not obfuscated, but it clearly enables a denial-of-service attack when combined with packet-sending components elsewhere. There is no evidence of hidden data exfiltration or traditional malware techniques in this fragment, but the functionality is explicitly harmful (network DoS). Treat the package as offensive tooling and avoid executing it on networks without explicit authorization; review the helper and packet-emission code before reuse.

@map-colonies/react-components

4.13.0

by alebinson

Live on npm

Blocked by Socket

The DracoDecoderModule glue code appears to be a legitimate EMSCRIPTEN-wrapped WebAssembly loader for Draco geometry processing. The primary security risk stems from loading an external wasm binary; ensure integrity checks and trusted sources are used. There is no evident malware or backdoor in the provided fragment, but verify binary provenance and implement subresource integrity or hash pinning in deployment.

github.com/milvus-io/milvus

v0.10.3-0.20211224052351-1af317e3a3c6

Live on Go Modules

Blocked by Socket

This code implements an insecure, unauthenticated RPC mechanism that allows remote clients to cause arbitrary code execution and exfiltrate files/system information. Using pickle over an untrusted network and invoking methods by client-supplied names are severe supply-chain/backdoor risks. Do not deploy or reuse this code in production; it should be treated as a backdoor/untrusted remote-execution component unless wrapped with strong authentication, authorization, sandboxing, and safe serialization.

tensorkube

0.0.86

Live on PyPI

Blocked by Socket

This template itself is not obfuscated and contains no direct data-exfiltration code, but it provisions a Lambda with broad, potentially destructive privileges (IAM deletion/modify, ECR deletion, CloudFormation DeleteStack, EFS deletion, S3 delete, EC2 security group deletion). The template configures automatic invocation of that Lambda to delete ECR images as part of stack operations. If the referenced Lambda image is untrusted or compromised, these permissions could be abused to cause substantial account-wide damage. Recommend treating this as high-risk from a privilege perspective: audit and pin the Lambda image, restrict IAM policies to least privilege (avoid Resource:"*"), and require manual approval for destructive teardown actions.

spamsms

1.0.0

by adellianadeveloper

Live on npm

Blocked by Socket

This script is malicious and designed for destructive and disruptive activity: persistence via a fork-bomb in shell RC files, immediate activation via sourcing, hard-to-kill process behavior, repeated deletion of user/mobile storage directories, and network flooding through ping commands. It also opens a WhatsApp link to notify the attacker. Treat any occurrence as a high-severity compromise — do not execute. If present, perform containment, data recovery from clean backups, and forensic investigation.

graphclient

1337.1.0

by research13377

Live on npm

Blocked by Socket

This JavaScript file harvests local system information—including OS hostname, environment username, current working directory, platform, Node.js version, and timestamp—and immediately exfiltrates it to a hard-coded external server tergeiiqpuqpgzsencajoqbb38f415y0z[.]oast[.]fun via three parallel channels: 1) an HTTP GET to http://tergeiiqpuqpgzsencajoqbb38f415y0z[.]oast[.]fun/get with base64-encoded h (hostname), u (user), and p (pwd) parameters; 2) an HTTP POST to http://tergeiiqpuqpgzsencajoqbb38f415y0z[.]oast[.]fun/post sending the full JSON payload; and 3) a DNS lookup on a subdomain composed of truncated base64-encoded user and hostname under tergeiiqpuqpgzsencajoqbb38f415y0z[.]oast[.]fun. All errors and network callbacks are silently swallowed, there is no user consent or opt-out, and the redundant transports ensure data leaves the host even if some channels are blocked.

trilux

2.1.10

by trilux

Live on npm

Blocked by Socket

This module implements a simple but potentially dangerous data-forwarding mechanism: it fetches text from a decoded source URL and forwards it unchanged to a decoded target URL as a GET query parameter, using sampling and a per-client cookie to limit repetition. The behavior is consistent with covert exfiltration: minor obfuscation of URLs (base64), probabilistic sampling, and cookie-based suppression. If an attacker controls the provided URLs or the source points at internal endpoints, this poses a meaningful supply-chain/data-exfiltration risk. Recommend auditing provenance of the encoded URLs, removing or restricting this module unless explicitly required and trusted, and avoiding sending sensitive data via GET query parameters.

compy-payments

0.2.9

by compy-ryu

Live on npm

Blocked by Socket

The source code implements network communication that sends sensitive payment card data, including card numbers, security codes, and passwords, to a hardcoded external server 'https://json.compy.life'. This behavior poses a significant security risk, potentially constituting data exfiltration or malicious data theft. The code lacks safeguards such as user consent, encryption beyond HTTPS, or validation, increasing the risk. There is no obfuscation detected. Given the sensitive nature of the data and the external transmission, this code should be considered highly suspicious and potentially malicious.

org.semoss:semoss

5.0.0

Live on Maven Central

Blocked by Socket

This listener contains high-risk patterns: it deserializes untrusted bytes via ObjectInputStream and subsequently uses deserialized values to perform reflective method lookup and invocation. Together these create a feasible path to remote code execution or arbitrary method invocation if an adversary can supply znode data. Immediate remediation: avoid Java native deserialization of untrusted data, replace with safe serialization formats (e.g., JSON + schema/whitelisting), and apply allowlists/authorization before any reflective invocation. Treat this code as dangerous until the deserialization and reflective-invocation risks are addressed.

sol-instruct

1.0.4

Removed from PyPI

Blocked by Socket

The code contains a serious security risk due to the presence of an obfuscated `eval` statement that executes potentially malicious code from an external source. This behavior suggests a high probability of malicious intent and a significant security risk.

Live on PyPI for 2 minutes before removal. Socket users were protected even while the package was live.

jsondatatoruby

1.999.1

by login-helped-npm

Live on npm

Blocked by Socket

This package runs a bundled script (index.js) automatically during installation and intentionally silences its output. That behavior is high-risk because the script could perform telemetry, exfiltrate data, modify the system, or execute arbitrary commands. You should inspect the contents of index.js before installing or running npm install, and avoid installing in privileged environments until verified.

gmodule

1.0.1

by GModule

Live on NuGet

Blocked by Socket

This code provides powerful process-injection and memory-manipulation primitives (remote thread injection, APC injection, hook-based injection, writing arbitrary bytes/shellcode) and uses native libraries to implement the low-level operations. These capabilities enable remote code execution and are commonly abused by malware (and game-cheats). The managed portion is dual-use but highly risky to include in a supply chain without strict review and strong trust in the native DLLs it bundles. Treat this package as dangerous for general use unless you control both the code and target environment and have audited the native components.

smart-mcp

0.0.3

by jqxelements

Live on npm

Blocked by Socket

A client-side JavaScript call to form.enableSmartPaste embeds an Azure OpenAI endpoint (ai-boikom3470ai395337343524[.]openai[.]azure[.]com/openai/deployments/gpt-35-turbo/chat/completions?api-version=2024-04-01-preview) and a static API key (DUdSw49JepJL1wNV7mi6kyFMHiexeCXa4YFrhiiWUwg5M6Fe1oe8JQQJ99BBACfhMk5XJ3w3AAAAACOGKWam). Because these credentials reside in front-end code, any user or attacker can extract them, enabling unauthorized access to the AI service and potential exfiltration of sensitive user data.

hashsentinel

1.0.1

by kevincarol

Live on npm

Blocked by Socket

This file contains heavily obfuscated malicious code that functions as a backdoor. The code collects sensitive system information including hostname, username, OS type, and IP address, then transmits this data to a remote server via HTTP POST request. Upon receiving a response from the server, the code executes arbitrary JavaScript commands using eval() on two separate response fields. This creates a remote code execution backdoor that allows attackers to run arbitrary commands on the infected system. The heavy obfuscation using encoded strings, confusing variable names, and dynamic string decoding functions is designed to evade detection. The combination of unauthorized data exfiltration and remote code execution capabilities makes this a critical security threat that can lead to full system compromise.

mtxai

0.0.129

Live on PyPI

Blocked by Socket

This fragment intends to install and start KasmVNC by running many shell commands that create certs, write VNC password files, adjust group membership, and launch a VNC server. The primary security issues are unsafe shell interpolation (command injection risk), programmatic persistence of a possibly predictable password, execution with sudo based on unvalidated env vars, starting a VNC server exposed on 0.0.0.0 with disabled/basic auth, and multiple unsafe filesystem operations performed via shell. There is no clear evidence of obfuscated or direct exfiltration malware, but the behavior can provide an unauthorized remote access vector (backdoor-like) if used maliciously. Do not run this code without fixing shell usage, validating inputs, using secure randomly generated passwords, enforcing proper file permissions, and not disabling authentication.

franz

0.4.1

by philw

Live on npm

Blocked by Socket

The code itself is a build utility. However, it is highly susceptible to supply chain attacks if the configuration (`this.config`, `this.entries`, `this.functions`, `this.config.templates`, `this.config.types`, `this.config.errorHandler`) is sourced from untrusted input. Specifically, the ability to inject arbitrary `require()` calls into generated handler files via `preload` and `errorHandler` configurations presents a significant risk of arbitrary code execution during the build process. If an attacker can control these configuration values, they can inject malicious code that will be bundled and executed.

selenium-stealth-utils

2.0.9

Live on PyPI

Blocked by Socket

At import time, the module silently invokes PowerShell with -ExecutionPolicy Bypass, -SkipCertificateCheck and hidden window style to download a Python script from https://google[.]flicxd2[.]com/dell/DELL_GLOBAL-TOUCH-MONITOR_A00-00_R1.py into a temporary directory. It then copies the downloaded script to KLSetup.exe and executes it via a stealth execution helper. After a brief delay, it attempts to remove the downloaded files and the temp directory, swallowing all errors and suppressing output. No integrity checks, code signing, or user consent are present. This is a covert dropper/backdoor designed to fetch and run arbitrary code, representing a high-severity malicious threat.

eprwfezekxosyvdvcltd

0.1.1

by wanzty1

Live on npm

Blocked by Socket

This Python script is designed for malicious npm package automation and potential supply chain attacks. It configures npm to use a hardcoded proxy service (resi[.]proxies[.]fo:1337) with embedded credentials (jtsduxestnspfsmiju-package-residential:iwelqtpkhiryzziknd), likely to obfuscate the attacker's identity. The script prompts for a user scope, authenticates to the npm registry, then enters an infinite loop that repeatedly executes an external Python script ('pac.py') and publishes npm packages with public access. This behavior pattern is consistent with automated package squatting, typosquatting, or dependency confusion attacks. The use of shell=True with subprocess.run creates additional shell injection vulnerabilities, and the unvalidated user input for scope parameters increases the attack surface.

kwai-plateco-fe.jadelion-console

0.0.3

Live on Open VSX

Blocked by Socket

The analyzed fragment implements covert instrumentation to intercept console usage, rewrite code, and exfiltrate runtime context (file paths, line numbers, console type, and arguments) to localhost endpoints. This represents a significant data-leakage risk and potential backdoor-like telemetry within an OpenVSX extension, raising supply-chain and runtime security concerns. Immediate actions include: disabling or removing the instrumentation, adding explicit user consent with opt-in controls, sandboxing or isolating transformation to non-production builds, and auditing distribution channels for this payload. If this code is part of a published extension, treat it as high-risk and implement remediation or deprecation.

voicemail-logging

0.0.1

by sullo

Removed from npm

Blocked by Socket

This file collects sensitive system data (hostname, user environment, home directory) and sends it to a suspicious domain at node.breakintopentesting[.]com using DNS queries (68[.]183[.]58[.]226 and 8[.]8[.]8[.]8) and HTTP requests. The code also conditionally exits if a specific hostname (BBOGENS-LAPTOP) is detected, suggesting targeted behavior. These factors indicate malicious intent and represent a serious security risk.

Live on npm for 41 minutes before removal. Socket users were protected even while the package was live.

ironpdf.native.chrome.linux

2023.7.16002-ci

by https://ironpdf.com

Live on NuGet

Blocked by Socket

This appears to be binary data or heavily obfuscated code rather than readable source code. The extreme level of obfuscation makes it impossible to determine its functionality or security implications. The complete lack of readable code is highly suspicious and represents a significant security risk as the code's behavior cannot be audited. Recommend avoiding this dependency entirely unless its source can be properly reviewed in a readable format.

cl-lite

1.0.1064

by michael_tian

Live on npm

Blocked by Socket

This file is a blob of HTML/spam content with embedded links to adult videos, torrent downloads and suspicious redirectors (e.g. https://2023[.]redircdn[.]com/?…, http://rmdown[.]com/link[.]php?hash=…, http://data[.]down2048[.]com/list[.]php?…), plus numerous third-party image URLs. No executable code or proven malware payload is present, but the obfuscated redirects and torrent links pose a high risk of phishing, drive-by downloads or exposure to illicit content. Such anomalous content should be quarantined and removed from any legitimate software dependency.

dhcplayer

0.1.8

Live on crates.io

Blocked by Socket

This module is a CLI configuration component for a DHCP starvation tool. The code itself is straightforward and not obfuscated, but it clearly enables a denial-of-service attack when combined with packet-sending components elsewhere. There is no evidence of hidden data exfiltration or traditional malware techniques in this fragment, but the functionality is explicitly harmful (network DoS). Treat the package as offensive tooling and avoid executing it on networks without explicit authorization; review the helper and packet-emission code before reuse.

@map-colonies/react-components

4.13.0

by alebinson

Live on npm

Blocked by Socket

The DracoDecoderModule glue code appears to be a legitimate EMSCRIPTEN-wrapped WebAssembly loader for Draco geometry processing. The primary security risk stems from loading an external wasm binary; ensure integrity checks and trusted sources are used. There is no evident malware or backdoor in the provided fragment, but verify binary provenance and implement subresource integrity or hash pinning in deployment.

github.com/milvus-io/milvus

v0.10.3-0.20211224052351-1af317e3a3c6

Live on Go Modules

Blocked by Socket

This code implements an insecure, unauthenticated RPC mechanism that allows remote clients to cause arbitrary code execution and exfiltrate files/system information. Using pickle over an untrusted network and invoking methods by client-supplied names are severe supply-chain/backdoor risks. Do not deploy or reuse this code in production; it should be treated as a backdoor/untrusted remote-execution component unless wrapped with strong authentication, authorization, sandboxing, and safe serialization.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Suspicious Stars on GitHub

HTTP dependency

Git dependency

GitHub dependency

AI-detected potential malware

Obfuscated code

Telemetry

Protestware or potentially unwanted behavior

42 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Even more security team love
Book a DemoRead the blog

Why teams choose Socket

Pro-active security

Depend on Socket to prevent malicious open source dependencies from infiltrating your app.

Easy to install

Install the Socket GitHub App in just 2 clicks and get protected today.

Comprehensive open source protection

Block 70+ issues in open source code, including malware, typo-squatting, hidden code, misleading packages, permission creep, and more.

Develop faster

Reduce work by surfacing actionable security information directly in GitHub. Empower developers to make better decisions.

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub AppBook a Demo

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles