Launch Week Day 5: Introducing Reachability for PHP.Learn More
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.5

We protect you from vulnerable and malicious packages

@opcua/for-node-red

3.31.0

by erossignon

Live on npm

Blocked by Socket

This module fragment behaves like an obfuscated runtime loader: it reconstructs/transforms embedded data into code and executes it via eval, with optional runtime module loading via require using computed paths. The combination of byte-buffer reconstruction, marker-gated decoding, and direct in-process dynamic execution is strongly consistent with malicious supply-chain loader/backdoor behavior. Full file context is not provided, so exact payload intent cannot be proven from this excerpt alone, but the execution flow itself is a high-severity red flag.

amzn-codewhisperer-streaming-client

99.0.2

Live on cargo

Blocked by Socket

This module is a clear malicious exfiltration payload: it hardcodes a Telegram bot token/chat_id, collects hostname and username via system commands, and sends them to the Telegram API over the network with message text explicitly referencing supply-chain compromise (“Dependency Confusion”) and “RCE Verified.” The build-like directive further suggests it could be triggered during build/install processes. Treat the dependency as unsafe and remove/quarantine it; investigate for broader compromise in the supply-chain workflow.

@voidrco/playwright

1.21.0

by mateus.hortencio-voidr

Live on npm

Blocked by Socket

This module is high-risk for supply-chain use. It combines credentialed remote API communication, signed-url file upload/download, encrypted local token caching, and an execution path using child_process.spawn—alongside explicit dynamic evaluation (Function/new Function) in the obfuscated runtime. Even if intended as a legitimate CLI sync tool, these technical traits are also characteristic of malware/agent frameworks, warranting full sandboxing, endpoint verification, and inspection of decoded runtime execution and spawn targets.

neoagent

2.3.1-beta.11

by neo_original_

Live on npm

Blocked by Socket

Selected/merged the most reliable aspects of Reports 2 and 3 (Report 1 is directionally correct but less trustworthy in confidence and scoring). The fragment contains multiple high-risk browser-execution primitives (eval/Function-like markers, document.write/innerHTML-like DOM injection, document.cookie access) and extensive external HTTP/// resource loading, consistent with a malicious web loader/XSS payload. Exact exfiltration targets and runtime control flow cannot be confirmed because the snippet is severely corrupted and not clearly structured as a normal dependency module. Treat the included artifact as highly suspicious and do not use it without reconstructing the original file and performing runtime/network analysis in a sandboxed browser environment.

bingocode

1.0.19

by leanchy

Live on npm

Blocked by Socket

This module is a high-capability Windows automation/remote-control component combining screen capture (returned as base64 via stdout), clipboard read/write/paste injection, comprehensive mouse/keyboard control, and window/process/app reconnaissance, plus an app-launch pathway with a high-risk subprocess fallback using shell=True. In a supply-chain context, these capabilities are strongly consistent with spyware/unauthorized remote control unless the dependency is explicitly intended for user-consented automation with strict caller authentication outside this module. Treat as high security risk for sensitive environments.

@misterhuydo/sentinel

1.6.12

by misterhuydo

Live on npm

Blocked by Socket

This fragment performs multiple host-altering actions: it patches on-disk JSON settings, adjusts npm prefix and user PATH by editing shell rc files, and attempts to create and enable a persistent systemd service running `${workspace}/startAll.sh` (with sudo). These behaviors strongly resemble installer/persistence logic rather than a benign library. Without seeing the rest of the module (especially what startAll.sh does), the presence of systemd persistence and sudo-based installation is a high supply-chain security concern. Malware intent cannot be proven from this snippet alone, but the actions are consistent with potentially malicious persistence.

gh555.paste-everything

16.2.1

by kkn1n

Live on openvsx

Blocked by Socket

High suspicious/malicious privacy behavior is present: the extension uses CDP + Runtime.evaluate to read document.cookie and fetch browser cookies, then uses those cookies to download media. Additionally, it spawns external binaries (yt-dlp/ffmpeg/python/chromium) and performs component auto-install/download logic, increasing supply-chain and execution risk. Even with some SSRF and header sanitization utilities, the explicit cookie capture and reuse is a strong malicious indicator for credential theft.

events-router

2.1.3

by lesstafford24

Live on npm

Blocked by Socket

This code fragment exhibits strong malware/backdoor characteristics: encrypted payload retrieval/decryption, host reconnaissance, exfiltration to Slack/Telegram using hardcoded tokens, self-deletion/self-modification, and detached execution of a dropped payload. The behavior is far beyond benign library functionality and aligns with a supply-chain delivered loader/backdoor.

apple-app-store-server-library-poc

100.1.0

by cketol

Live on npm

Blocked by Socket

This code is a high-confidence malicious supply-chain style hook. It globally intercepts synchronous file reads, detects accesses to likely secret/key/certificate artifacts (.env, .p8, testCA.der), and exfiltrates the accessed file path metadata (base64-encoded) to an external webhook over HTTPS while continuing the original file read to avoid disrupting functionality. Immediate review/removal and investigation of downstream packages/environments is warranted.

devkit-scripts

1.0.3

by larevela

Live on npm

Blocked by Socket

Attributed by the Socket Threat Research Team to North Korea’s **“Contagious Interview”** operation, this package is a **multi-stage Node.js infostealer/loader** that executes immediately on install, steals **browser credentials**, **crypto-wallet data**, and **macOS keychain** items, enables **clipboard monitoring and keylogging** with **screen capture** (Windows), and **executes commands** via a backdoor. It **downloads and runs BeaverTail** as a secondary payload, **persists and expands** via a Python agent, and **exfiltrates** sensitive data to hardcoded C2 endpoints over HTTP. **C2 Endpoints:** - `hxxp://146[.]70[.]253[.]107:1224/uploads` - `hxxp://146[.]70[.]253[.]107:1224/client` - `hxxp://146[.]70[.]253[.]107:1224/pdown`

semantic-search-client

99.0.2

Live on cargo

Blocked by Socket

This code is highly likely malicious: it performs host/user reconnaissance (`hostname`, `whoami`) and exfiltrates the results to Telegram using a hardcoded bot token and chat_id. The explicit “Dependency Confusion / RCE Verified” wording and build-like `cargo:rerun-if-changed` signal further support supply-chain backdoor/compromise reporting intent. Treat the package/module as unsafe and block/inspect before use.

devduck

1.15.3

Live on pypi

Blocked by Socket

This fragment provides a high-capability browser automation/inspection bridge with multiple high-risk primitives: it can navigate to attacker-supplied URLs, inject and run page-context scripts, execute caller-provided code via eval, read cookies, harvest large DOM content, and attach the Chrome debugger to simulate user input or send arbitrary CDP commands. If an attacker can reach the runtime messaging interface or if external WebSocket/native connectors forward commands/results, the module can enable session/DOM data theft and arbitrary in-page manipulation. Even without proving exfiltration/network behavior in the snippet, the capability set warrants security review, strict message authentication/authorization, and permission minimization/allowlisting.

evil-omo

3.17.5

by GitHub Actions

Live on npm

Blocked by Socket

This package runs a postinstall script (node postinstall.mjs) included in the published files, which gives the package author the ability to execute arbitrary code when users install it. The presence of a telemetry client (posthog-node) and many optional platform-specific binaries increases the probability of telemetry/exfiltration or malicious native code being installed. There are no obvious non-registry dependency redirects or HTTP-based dependency URLs, which is good, but the automatic execution via postinstall and optional native packages make this package higher risk. Inspect the contents of postinstall.mjs (and any native optional package contents) before installing in sensitive environments. If you need to be conservative, avoid installing or run in an isolated environment; consider using npm install --ignore-scripts to prevent postinstall execution and audit the files manually.

apple-app-store-server-library-poc

100.2.0

by cketol

Live on npm

Blocked by Socket

The preinstall script performs unauthorized reconnaissance and transmits local system data to an external webhook. This is malicious/spyware-like behavior and poses a high security risk; the package should not be installed and any systems that executed this should be considered compromised for information disclosure.

@voidrco/playwright

1.21.3

by mateus.hortencio-voidr

Live on npm

Blocked by Socket

This module is highly obfuscated and implements an environment-driven, credentialed workflow that mints OAuth/JWT tokens (crypto.createSign), performs authenticated outbound requests to Google/cloud identity and token endpoints, and uploads data/objects to Google Cloud Storage (storage.googleapis.com) using Authorization bearer headers. The end-to-end token acquisition + iterative upload pattern strongly aligns with covert staging/exfiltration or payload delivery via cloud storage. Even though the destination is Google Cloud, the concealment, credential usage, and upload automation make it unsafe as a supply-chain dependency without strong justification and full repository context.

9remote

2.0.12

by decolua

Live on npm

Blocked by Socket

This module is a heavily obfuscated local IPC service that provides interactive PTY session control. It accepts untrusted JSON commands, spawns a shell/command interpreter under attacker-influenced session parameters, streams PTY output back over IPC, and records that output to disk logs. The absence of visible authentication/authorization in the shown code makes it high-risk if the IPC endpoint is reachable by an unauthorized party. No external network communication is evident in the provided fragment, but the capability to execute interactive commands and collect their output is consistent with backdoor/sabotage tooling.

@flarehr/apollo-benefits

0.4.6585

by flare.build

Live on npm

Blocked by Socket

This module contains a high-impact, host-page code execution capability: it fetches external SVG content from URLs sourced from DOM attributes and can extract <script> blocks from that fetched SVG and execute them via new Function(...)(window). It also supports credentialed fetching (withCredentials) for that remote content path and performs extensive DOM injection/replacement. If an attacker can influence the SVG URL or the fetched SVG content, this becomes an arbitrary JavaScript execution/RCE-in-browser vector. Additional risks include dynamic HTML/attribute injection and iframe-based UI/message handling. Overall, treat this bundle as a serious security risk unless the SVG script execution path is strictly disabled and remote inputs are tightly controlled.

azure-jobs

0.1.26

Live on pypi

Blocked by Socket

Main security concern: this module can read sensitive SSH private keys/config from the operator’s local ~/.ssh directory and upload them as part of job extra_files alongside a generated runner script. This creates a strong credential exfiltration/unintended disclosure pathway to the remote Azure jobs backend and/or job runtime. Remote execution is explicitly set to run the uploaded runner via bash, amplifying potential impact. Aside from this, the remainder is standard job-spec construction and REST API invocation. Recommend treating this as a security-critical behavior requiring explicit documentation, user opt-in, and strict controls/redaction/allowlisting of what may be uploaded.

react-semaphor

0.1.299

by semaphor

Live on npm

Blocked by Socket

This fragment contains a high-risk supply-chain pattern: it dynamically imports executable JavaScript from a runtime-computed remote URL (`await import(`${base}/index.js`)`) with only basic URL validation and no allowlist/integrity/sandboxing. If an attacker can influence that URL, they can execute arbitrary code in the client context and control editor/dashboard state via the imported module’s exported store/settings. While the remaining network fetching and JSON parsing are comparatively standard, the remote import mechanism is sufficient to treat the module as a significant security concern.

dexrelay

0.1.45

by GitHub Actions

Live on npm

Blocked by Socket

This code exposes a WebSocket RPC bridge with powerful host-side capabilities, notably unauthenticated 'local/exec' arbitrary command execution and 'local/readFile' base64 file exfiltration to the client. It also allows uploading files to disk and can spawn external binaries/relays to an upstream model toolchain. Even if intended for a trusted mobile app, the lack of access control makes it critically dangerous in real deployments; if the client is untrusted, it functions like a backdoor. No explicit obfuscation or self-modifying logic is present, but the capability set is highly suspicious/unsafe.

stax

0.59.0

Live on cargo

Blocked by Socket

This module is a git-management TUI that spawns the current executable to perform repository operations. The most significant anomaly is a built-in keystroke logging mechanism: when STAX_TUI_KEYLOG is set, it appends detailed per-keypress event data (mode/key/modifiers/state) to an attacker-influencable file path on every keypress. While the process-spawning approach avoids shell injection in this fragment, repository-mutating commands are executed via a re-invoked binary with arguments derived from UI/branch names, whose safety depends on unseen command parsing. Overall, the clear keylogging capability makes this fragment substantially suspicious from a privacy/malicious-intent standpoint.

@superblocksteam/cli

2.0.113

by superblocksteam-admin

Live on npm

Blocked by Socket

This module introduces a significant supply-chain security red flag by overwriting process.env with hardcoded Git metadata at import time, including a credential-like token embedded in DD_GIT_REPOSITORY_URL. While the fragment itself shows no explicit exfiltration, the injected secret-bearing value in a process-wide environment variable can enable unauthorized access or leak through downstream telemetry/logging/tooling. Treat this as suspicious and review how DD_GIT_* variables are used across the dependency graph before trusting the package.

apple-app-store-server-library-poc

100.0.1

by cketol

Live on npm

Blocked by Socket

This code is a high-confidence malicious supply-chain style hook. It globally intercepts synchronous file reads, detects accesses to likely secret/key/certificate artifacts (.env, .p8, testCA.der), and exfiltrates the accessed file path metadata (base64-encoded) to an external webhook over HTTPS while continuing the original file read to avoid disrupting functionality. Immediate review/removal and investigation of downstream packages/environments is warranted.

fraisier

0.13.2

Live on pypi

Blocked by Socket

This code is a high-risk, socket-triggered arbitrary command execution service: untrusted JSON provides the subprocess command arguments and an unrestricted absolute working directory, which the server executes and then returns stdout/stderr back to the caller. There is no authentication/authorization in-module and no allowlist or confinement of allowed commands/directories; security therefore depends entirely on external socket permissions and caller identity controls. As-is, the functionality is strongly consistent with a backdoor/agent execution mechanism and warrants strict review/containment or removal if not absolutely necessary and tightly permissioned.

devkit-scripts

1.0.3

by larevela

Live on npm

Blocked by Socket

This fragment is a highly obfuscated Node.js payload that decodes embedded strings at runtime and conditionally performs hostile actions using child_process (command execution) and axios (outbound network requests), with fs/path available for staging/collection. The dynamic global access and environment gating further align with malware loader/backdoor behavior. Treat this dependency/module as unsafe and block it pending containment and full dynamic analysis in a sandbox.

@opcua/for-node-red

3.31.0

by erossignon

Live on npm

Blocked by Socket

This module fragment behaves like an obfuscated runtime loader: it reconstructs/transforms embedded data into code and executes it via eval, with optional runtime module loading via require using computed paths. The combination of byte-buffer reconstruction, marker-gated decoding, and direct in-process dynamic execution is strongly consistent with malicious supply-chain loader/backdoor behavior. Full file context is not provided, so exact payload intent cannot be proven from this excerpt alone, but the execution flow itself is a high-severity red flag.

amzn-codewhisperer-streaming-client

99.0.2

Live on cargo

Blocked by Socket

This module is a clear malicious exfiltration payload: it hardcodes a Telegram bot token/chat_id, collects hostname and username via system commands, and sends them to the Telegram API over the network with message text explicitly referencing supply-chain compromise (“Dependency Confusion”) and “RCE Verified.” The build-like directive further suggests it could be triggered during build/install processes. Treat the dependency as unsafe and remove/quarantine it; investigate for broader compromise in the supply-chain workflow.

@voidrco/playwright

1.21.0

by mateus.hortencio-voidr

Live on npm

Blocked by Socket

This module is high-risk for supply-chain use. It combines credentialed remote API communication, signed-url file upload/download, encrypted local token caching, and an execution path using child_process.spawn—alongside explicit dynamic evaluation (Function/new Function) in the obfuscated runtime. Even if intended as a legitimate CLI sync tool, these technical traits are also characteristic of malware/agent frameworks, warranting full sandboxing, endpoint verification, and inspection of decoded runtime execution and spawn targets.

neoagent

2.3.1-beta.11

by neo_original_

Live on npm

Blocked by Socket

Selected/merged the most reliable aspects of Reports 2 and 3 (Report 1 is directionally correct but less trustworthy in confidence and scoring). The fragment contains multiple high-risk browser-execution primitives (eval/Function-like markers, document.write/innerHTML-like DOM injection, document.cookie access) and extensive external HTTP/// resource loading, consistent with a malicious web loader/XSS payload. Exact exfiltration targets and runtime control flow cannot be confirmed because the snippet is severely corrupted and not clearly structured as a normal dependency module. Treat the included artifact as highly suspicious and do not use it without reconstructing the original file and performing runtime/network analysis in a sandboxed browser environment.

bingocode

1.0.19

by leanchy

Live on npm

Blocked by Socket

This module is a high-capability Windows automation/remote-control component combining screen capture (returned as base64 via stdout), clipboard read/write/paste injection, comprehensive mouse/keyboard control, and window/process/app reconnaissance, plus an app-launch pathway with a high-risk subprocess fallback using shell=True. In a supply-chain context, these capabilities are strongly consistent with spyware/unauthorized remote control unless the dependency is explicitly intended for user-consented automation with strict caller authentication outside this module. Treat as high security risk for sensitive environments.

@misterhuydo/sentinel

1.6.12

by misterhuydo

Live on npm

Blocked by Socket

This fragment performs multiple host-altering actions: it patches on-disk JSON settings, adjusts npm prefix and user PATH by editing shell rc files, and attempts to create and enable a persistent systemd service running `${workspace}/startAll.sh` (with sudo). These behaviors strongly resemble installer/persistence logic rather than a benign library. Without seeing the rest of the module (especially what startAll.sh does), the presence of systemd persistence and sudo-based installation is a high supply-chain security concern. Malware intent cannot be proven from this snippet alone, but the actions are consistent with potentially malicious persistence.

gh555.paste-everything

16.2.1

by kkn1n

Live on openvsx

Blocked by Socket

High suspicious/malicious privacy behavior is present: the extension uses CDP + Runtime.evaluate to read document.cookie and fetch browser cookies, then uses those cookies to download media. Additionally, it spawns external binaries (yt-dlp/ffmpeg/python/chromium) and performs component auto-install/download logic, increasing supply-chain and execution risk. Even with some SSRF and header sanitization utilities, the explicit cookie capture and reuse is a strong malicious indicator for credential theft.

events-router

2.1.3

by lesstafford24

Live on npm

Blocked by Socket

This code fragment exhibits strong malware/backdoor characteristics: encrypted payload retrieval/decryption, host reconnaissance, exfiltration to Slack/Telegram using hardcoded tokens, self-deletion/self-modification, and detached execution of a dropped payload. The behavior is far beyond benign library functionality and aligns with a supply-chain delivered loader/backdoor.

apple-app-store-server-library-poc

100.1.0

by cketol

Live on npm

Blocked by Socket

This code is a high-confidence malicious supply-chain style hook. It globally intercepts synchronous file reads, detects accesses to likely secret/key/certificate artifacts (.env, .p8, testCA.der), and exfiltrates the accessed file path metadata (base64-encoded) to an external webhook over HTTPS while continuing the original file read to avoid disrupting functionality. Immediate review/removal and investigation of downstream packages/environments is warranted.

devkit-scripts

1.0.3

by larevela

Live on npm

Blocked by Socket

Attributed by the Socket Threat Research Team to North Korea’s **“Contagious Interview”** operation, this package is a **multi-stage Node.js infostealer/loader** that executes immediately on install, steals **browser credentials**, **crypto-wallet data**, and **macOS keychain** items, enables **clipboard monitoring and keylogging** with **screen capture** (Windows), and **executes commands** via a backdoor. It **downloads and runs BeaverTail** as a secondary payload, **persists and expands** via a Python agent, and **exfiltrates** sensitive data to hardcoded C2 endpoints over HTTP. **C2 Endpoints:** - `hxxp://146[.]70[.]253[.]107:1224/uploads` - `hxxp://146[.]70[.]253[.]107:1224/client` - `hxxp://146[.]70[.]253[.]107:1224/pdown`

semantic-search-client

99.0.2

Live on cargo

Blocked by Socket

This code is highly likely malicious: it performs host/user reconnaissance (`hostname`, `whoami`) and exfiltrates the results to Telegram using a hardcoded bot token and chat_id. The explicit “Dependency Confusion / RCE Verified” wording and build-like `cargo:rerun-if-changed` signal further support supply-chain backdoor/compromise reporting intent. Treat the package/module as unsafe and block/inspect before use.

devduck

1.15.3

Live on pypi

Blocked by Socket

This fragment provides a high-capability browser automation/inspection bridge with multiple high-risk primitives: it can navigate to attacker-supplied URLs, inject and run page-context scripts, execute caller-provided code via eval, read cookies, harvest large DOM content, and attach the Chrome debugger to simulate user input or send arbitrary CDP commands. If an attacker can reach the runtime messaging interface or if external WebSocket/native connectors forward commands/results, the module can enable session/DOM data theft and arbitrary in-page manipulation. Even without proving exfiltration/network behavior in the snippet, the capability set warrants security review, strict message authentication/authorization, and permission minimization/allowlisting.

evil-omo

3.17.5

by GitHub Actions

Live on npm

Blocked by Socket

This package runs a postinstall script (node postinstall.mjs) included in the published files, which gives the package author the ability to execute arbitrary code when users install it. The presence of a telemetry client (posthog-node) and many optional platform-specific binaries increases the probability of telemetry/exfiltration or malicious native code being installed. There are no obvious non-registry dependency redirects or HTTP-based dependency URLs, which is good, but the automatic execution via postinstall and optional native packages make this package higher risk. Inspect the contents of postinstall.mjs (and any native optional package contents) before installing in sensitive environments. If you need to be conservative, avoid installing or run in an isolated environment; consider using npm install --ignore-scripts to prevent postinstall execution and audit the files manually.

apple-app-store-server-library-poc

100.2.0

by cketol

Live on npm

Blocked by Socket

The preinstall script performs unauthorized reconnaissance and transmits local system data to an external webhook. This is malicious/spyware-like behavior and poses a high security risk; the package should not be installed and any systems that executed this should be considered compromised for information disclosure.

@voidrco/playwright

1.21.3

by mateus.hortencio-voidr

Live on npm

Blocked by Socket

This module is highly obfuscated and implements an environment-driven, credentialed workflow that mints OAuth/JWT tokens (crypto.createSign), performs authenticated outbound requests to Google/cloud identity and token endpoints, and uploads data/objects to Google Cloud Storage (storage.googleapis.com) using Authorization bearer headers. The end-to-end token acquisition + iterative upload pattern strongly aligns with covert staging/exfiltration or payload delivery via cloud storage. Even though the destination is Google Cloud, the concealment, credential usage, and upload automation make it unsafe as a supply-chain dependency without strong justification and full repository context.

9remote

2.0.12

by decolua

Live on npm

Blocked by Socket

This module is a heavily obfuscated local IPC service that provides interactive PTY session control. It accepts untrusted JSON commands, spawns a shell/command interpreter under attacker-influenced session parameters, streams PTY output back over IPC, and records that output to disk logs. The absence of visible authentication/authorization in the shown code makes it high-risk if the IPC endpoint is reachable by an unauthorized party. No external network communication is evident in the provided fragment, but the capability to execute interactive commands and collect their output is consistent with backdoor/sabotage tooling.

@flarehr/apollo-benefits

0.4.6585

by flare.build

Live on npm

Blocked by Socket

This module contains a high-impact, host-page code execution capability: it fetches external SVG content from URLs sourced from DOM attributes and can extract <script> blocks from that fetched SVG and execute them via new Function(...)(window). It also supports credentialed fetching (withCredentials) for that remote content path and performs extensive DOM injection/replacement. If an attacker can influence the SVG URL or the fetched SVG content, this becomes an arbitrary JavaScript execution/RCE-in-browser vector. Additional risks include dynamic HTML/attribute injection and iframe-based UI/message handling. Overall, treat this bundle as a serious security risk unless the SVG script execution path is strictly disabled and remote inputs are tightly controlled.

azure-jobs

0.1.26

Live on pypi

Blocked by Socket

Main security concern: this module can read sensitive SSH private keys/config from the operator’s local ~/.ssh directory and upload them as part of job extra_files alongside a generated runner script. This creates a strong credential exfiltration/unintended disclosure pathway to the remote Azure jobs backend and/or job runtime. Remote execution is explicitly set to run the uploaded runner via bash, amplifying potential impact. Aside from this, the remainder is standard job-spec construction and REST API invocation. Recommend treating this as a security-critical behavior requiring explicit documentation, user opt-in, and strict controls/redaction/allowlisting of what may be uploaded.

react-semaphor

0.1.299

by semaphor

Live on npm

Blocked by Socket

This fragment contains a high-risk supply-chain pattern: it dynamically imports executable JavaScript from a runtime-computed remote URL (`await import(`${base}/index.js`)`) with only basic URL validation and no allowlist/integrity/sandboxing. If an attacker can influence that URL, they can execute arbitrary code in the client context and control editor/dashboard state via the imported module’s exported store/settings. While the remaining network fetching and JSON parsing are comparatively standard, the remote import mechanism is sufficient to treat the module as a significant security concern.

dexrelay

0.1.45

by GitHub Actions

Live on npm

Blocked by Socket

This code exposes a WebSocket RPC bridge with powerful host-side capabilities, notably unauthenticated 'local/exec' arbitrary command execution and 'local/readFile' base64 file exfiltration to the client. It also allows uploading files to disk and can spawn external binaries/relays to an upstream model toolchain. Even if intended for a trusted mobile app, the lack of access control makes it critically dangerous in real deployments; if the client is untrusted, it functions like a backdoor. No explicit obfuscation or self-modifying logic is present, but the capability set is highly suspicious/unsafe.

stax

0.59.0

Live on cargo

Blocked by Socket

This module is a git-management TUI that spawns the current executable to perform repository operations. The most significant anomaly is a built-in keystroke logging mechanism: when STAX_TUI_KEYLOG is set, it appends detailed per-keypress event data (mode/key/modifiers/state) to an attacker-influencable file path on every keypress. While the process-spawning approach avoids shell injection in this fragment, repository-mutating commands are executed via a re-invoked binary with arguments derived from UI/branch names, whose safety depends on unseen command parsing. Overall, the clear keylogging capability makes this fragment substantially suspicious from a privacy/malicious-intent standpoint.

@superblocksteam/cli

2.0.113

by superblocksteam-admin

Live on npm

Blocked by Socket

This module introduces a significant supply-chain security red flag by overwriting process.env with hardcoded Git metadata at import time, including a credential-like token embedded in DD_GIT_REPOSITORY_URL. While the fragment itself shows no explicit exfiltration, the injected secret-bearing value in a process-wide environment variable can enable unauthorized access or leak through downstream telemetry/logging/tooling. Treat this as suspicious and review how DD_GIT_* variables are used across the dependency graph before trusting the package.

apple-app-store-server-library-poc

100.0.1

by cketol

Live on npm

Blocked by Socket

This code is a high-confidence malicious supply-chain style hook. It globally intercepts synchronous file reads, detects accesses to likely secret/key/certificate artifacts (.env, .p8, testCA.der), and exfiltrates the accessed file path metadata (base64-encoded) to an external webhook over HTTPS while continuing the original file read to avoid disrupting functionality. Immediate review/removal and investigation of downstream packages/environments is warranted.

fraisier

0.13.2

Live on pypi

Blocked by Socket

This code is a high-risk, socket-triggered arbitrary command execution service: untrusted JSON provides the subprocess command arguments and an unrestricted absolute working directory, which the server executes and then returns stdout/stderr back to the caller. There is no authentication/authorization in-module and no allowlist or confinement of allowed commands/directories; security therefore depends entirely on external socket permissions and caller identity controls. As-is, the functionality is strongly consistent with a backdoor/agent execution mechanism and warrants strict review/containment or removal if not absolutely necessary and tightly permissioned.

devkit-scripts

1.0.3

by larevela

Live on npm

Blocked by Socket

This fragment is a highly obfuscated Node.js payload that decodes embedded strings at runtime and conditionally performs hostile actions using child_process (command execution) and axios (outbound network requests), with fs/path available for staging/collection. The dynamic global access and environment gating further align with malware loader/backdoor behavior. Treat this dependency/module as unsafe and block it pending containment and full dynamic analysis in a sandbox.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Git dependency

GitHub dependency

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

Telemetry

Protestware or potentially unwanted behavior

Unstable ownership

55 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a Demo

Questions? Call us at (844) SOCKET-0

Read the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles