Launch Week Day 5: Introducing Reachability for PHP.Learn More
Socket
Book a DemoSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.5

We protect you from vulnerable and malicious packages

mtmai

0.3.1161

Live on pypi

Blocked by Socket

This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.

xync-client

0.0.43.dev10

Live on pypi

Blocked by Socket

The code demonstrates high-security risk due to hardcoded credentials, MFA bypass mechanisms, and external data exfiltration via Telegram. While possibly intended for controlled automation, the combination of hardcoded secrets, Gmail-based approvals, and automated payments constitutes a substantial misuse risk. Recommend removing hardcoded credentials, securing secrets with env-based or vault management, enforcing MFA with server-side verification, disabling automated Gmail/MFA flows, and eliminating data exfiltration via chat platforms. Overall risk: very high; treat as unacceptable for production without significant remediation.

johnsnowlabs-by-ckl

5.1.8rc20

Live on pypi

Blocked by Socket

This module is a high-risk utility because it fetches Python code from remote URLs and local markdown files and executes that code directly via execute_py_script_string_as_new_proc without validation or sandboxing. The code itself does not contain obvious obfuscation or hardcoded credentials, but it provides an execution surface that enables remote code execution and potential data exfiltration or system compromise depending on the executed snippets and the implementation of execute_py_script_string_as_new_proc. Treat calls that use remote URLs or untrusted markdown as dangerous. Use only with trusted content or add validation/sandboxing (e.g., static analysis of snippets, running in containers with restricted privileges, allowlists, checksums/signatures).

lgblkb-tools

0.2.55

Live on pypi

Blocked by Socket

This module contains clear capability to read an arbitrary local file (hardcoded path in main) and upload it to a remote Telegram chat using an embedded bot token and chat id. The embedded credential and automatic upload constitute a high risk of data exfiltration if the code is run or distributed. Treat the token as compromised, revoke it, and remediate by removing hardcoded secrets and adding authentication/confirmation and secure secret management before trusting or publishing this code.

@bprotsyk/aso-core

1.2.77

by bprotsyk

Live on npm

Blocked by Socket

This code contains behavior consistent with data exfiltration and external tracking: it aggregates local mapping and campaign metadata and posts it to an external domain using a hardcoded Bearer token, and it creates streams whose redirect URLs forward click identifiers and app IDs to external controlpanel domains. While typical for campaign management automation, the presence of a hardcoded credential and explicit external endpoints that receive identifying parameters is a significant red flag. If this package is used in a broader project, it can leak internal data and user click identifiers to third parties. Recommendation: treat this as high risk — remove hardcoded credentials, review the external endpoints' trustworthiness, and ensure data privacy requirements are met before using. Further investigation should include checking whether the hardcoded token is active and whether the external domains are owned/controlled by the expected party.

@denzz221/baileys

8.0.8

by denzz221

Live on npm

Blocked by Socket

`lotusbail` is a malicious npm package that masquerades as a WhatsApp Web API library by forking legitimate Baileys-based code and preserving working messaging functionality. In addition to normal API behavior, it inserts a wrapper around the WhatsApp WebSocket client so that all traffic passing through the library is duplicated for collection. Reported data theft includes WhatsApp authentication tokens and session keys, full message content (sent/received and historical), contact lists (including phone numbers), and transferred media/files. The package also attempts to establish persistent unauthorized access by hijacking the WhatsApp device-linking (“pairing”) workflow using a hardcoded pairing code, effectively linking an attacker-controlled device to the victim’s account; removing the npm dependency does not automatically remove the linked device. To hinder detection, the exfiltration endpoint is hidden behind multiple obfuscation layers, collected data is encrypted (including a custom RSA implementation), and the code includes anti-debugging traps designed to disrupt analysis.

org.mvnpm:sweetalert2

11.15.10

Live on maven

Blocked by Socket

This code contains an injected, targeted sabotage payload: it detects Russian visitors/domains, persists a timestamp, and after 3 days disables page interaction and attempts to play an externally hosted audio file (Ukrainian anthem). This is malicious behavior (UX sabotage and forced remote content loading) and is inconsistent with a UI/dialog library. Do not use this package version — treat it as compromised and audit for further supply-chain tampering.

trxone

0.0.1

Removed from pypi

Blocked by Socket

This code defines a function that sends a private_key parameter in plaintext to an external endpoint via POST to https://68076f26e81df7060eba3e58.mockapi[.]io/tron (using a misspelled field name “ptivat_key” likely for obfuscation). It then issues a GET request to the same endpoint to determine its return value, creating a command-and-control channel. This behavior is designed to steal sensitive credentials.

Live on pypi for 5 hours and 52 minutes before removal. Socket users were protected even while the package was live.

jawira/skeleton

1.3.1

Live on composer

Blocked by Socket

The code contains explicit malicious intent aimed at tampering ClamAV signature sources by redirecting updates to a malicious CDN, creating a high-risk supply-chain/vector for system compromise. This is a backdoor-like behavior that can undermine malware scanning reliability and potentially exfiltrate data or introduce further payloads through trusted software updates. Removal of the malicious targets, validation of update sources, and strict access controls are essential.

github-badge-bot

1.8.8

Live on npm

Blocked by Socket

This code performs continuous, automated screenshot capture and exfiltration to a Telegram chat, along with host metadata. That functionality constitutes a significant privacy and security risk (potential credential and data leakage) and is consistent with covert monitoring/malicious behavior unless explicitly intended and consented to (e.g., endpoint management with transparent consent). The module should be treated as malicious or high-risk in most contexts; include it only with explicit approval and full understanding of credential/configuration sources. Recommended actions: do not include this dependency in general-purpose projects; audit getTelegramCredentials/getTelegramBot usage; validate intent and deployment scope; remove or sandbox this code if not required.

thunderpy

1.0.0

Live on pypi

Blocked by Socket

The file is a runtime loader/packer that decodes an embedded payload and executes it dynamically. Static evidence (open/read, unhexlify/decode, ''.join assembly, eval/exec, __import__, and function names implying execution/file operations) indicates high risk: the module is intentionally obfuscated and likely designed to execute unknown code at runtime. Treat as malicious/untrusted until the decoded payload is safely extracted and audited. Do NOT execute this code on production or non-isolated systems. Recommended next steps: extract and run the decode routine inside a fully-instrumented, network-isolated sandbox to capture the deobfuscated source and all runtime effects (file system, process execution, network connections), and then perform a detailed forensic review of the deobfuscated payload.

github.com/openshift/origin

v0.0.0-20250729025145-5ef42f5a7deb

Live on go

Blocked by Socket

High security concern: this module packages a dockercfg secret into a Docker image and includes a Ruby/Rack HTTP endpoint that can disclose arbitrary file contents by mapping URL paths to environment variables, including an ENV key that directly points to the embedded dockercfg. The image is then built and pushed to a registry, distributing the credential-leak/backdoor capability via the supply chain. Review/disable and investigate any downstream use of the produced artifact; treat as likely malicious even though direct external exfiltration is not shown in this snippet.

lighthouseid

0.1.1

by ahmadakbarpadilah

Live on npm

Blocked by Socket

This code contains a deliberate backdoor pattern designed to steal minted NFTs and cryptocurrency funds. The checkAddress() function always returns the hardcoded blockchain address 'sei1w69mqddj48lq2ewgh0e28srsw2fxltjektuc77' instead of using the connected user's wallet address. This hardcoded address is used throughout the application for: balance queries (client.getBalance), allowlist verification checks, Merkle proof construction for whitelist authorization, mint transaction recipient fields (recipient: checkAddress()), transaction sender parameters (client.executeMultiple), and clipboard copy operations. When users attempt to mint NFTs, the minted tokens are credited to the attacker-controlled hardcoded address rather than the user's wallet, while the user's wallet is charged for the transaction fees. The balance checks and allowlist verification are performed against the hardcoded address, which can mislead users about their eligibility and wallet balance. This malicious pattern enables the theft of both minted NFTs and associated cryptocurrency payments while presenting a deceptive user interface that appears to function normally.

infiltra

2.10

Live on pypi

Blocked by Socket

The code fragment constitutes a malicious PoC exploit designed to leverage CVE-2023-20889 for command execution and information disclosure, including potential data exfiltration via an out-of-band channel. It employs obfuscated-like techniques (base64 payloads, eval) and uses an authenticated flow to reach the payload delivery stage. This demonstrates strong supply-chain risk if surfaced in open-source samples, emphasizing the need for patching and cautious review of example payloads.

xync-client

0.0.91.dev2

Live on pypi

Blocked by Socket

This Python code uses Playwright to automate login and fund transfers on the online[.]mtsdengi[.]ru site. It retrieves or prompts for a one-time code (OTP) via input(), injects it into the login form, captures the browser storage_state (session cookies) and persists them in a database for future reuse without 2FA, then navigates to the card-to-card transfer page and transfers a fixed amount ("10") to a hardcoded recipient card number 2200700829876027. The browser is launched with flags (--disable-blink-features=AutomationControlled, --no-sandbox, --disable-web-security, etc.) to evade automation detection and security controls. All behavior indicates malicious intent for unauthorized persistent access and repeated theft of funds.

@emilgroup/process-manager-sdk-node

1.13.1

by cover42devs

Removed from npm

Blocked by Socket

The postinstall hook executes local code (index.js) at install time. That pattern is commonly used for legitimate setup tasks but is also a frequent vector for malicious activity (telemetry, data exfiltration, adding persistent hooks, spawning shells). You should inspect the contents of index.js (and any modules it loads) before installing or run the install in a sandbox. Since there are no explicit red flags in package.json itself (no HTTP URLs, no non-registry deps), the risk comes from the executed code rather than supply-chain metadata.

Live on npm for 1 hour and 48 minutes before removal. Socket users were protected even while the package was live.

dana-agent

0.25.7.18

Removed from pypi

Blocked by Socket

This module itself contains no obvious hidden backdoor or obfuscated malicious payload, but it intentionally executes external Python files found under multiple search paths (including user-writable locations like the current working directory and user home). That design introduces a high-risk supply-chain/plugin execution vector: untrusted plugin files named <domain>.py or package directories can run arbitrary code via exec_module and class instantiation. Recommend treating plugins from those paths as untrusted, restricting or validating plugin locations, using cryptographic signing or checksum verification, or executing plugins in an isolated process. Do not place sensitive credentials or run as privileged user when plugin discovery paths include writable directories.

Live on pypi for 1 hour and 28 minutes before removal. Socket users were protected even while the package was live.

354766/oimiragieo/agent-studio/gitops-workflow/

441839a6a07f6457d360b2d004971cf8793c69d9

Live on socket

Blocked by Socket

[Skill Scanner] URL pointing to executable file detected All findings: [CRITICAL] command_injection: URL pointing to executable file detected (CI010) [AITech 9.1.4] [HIGH] command_injection: Reference to external script with install/setup context (SC005) BENIGN: The fragment is a standard, coherent GitOps workflow guide outlining ArgoCD and Flux CD setup, application provisioning, and best practices. The presence of commands to install tools and retrieve a generated admin secret is typical for documentation and does not imply malicious behavior when not executed. The odd Memory Protocol Windows path is a minor anomaly but does not alter the overall purpose or introduce malware. No credentials are embedded; the data flows described align with official GitOps patterns. LLM verification: This skill is largely legitimate documentation for GitOps with ArgoCD and Flux. The most significant concerns are: (1) the Memory Protocol directives that require reading and writing specific local files in a developer workspace — this is unusual for a reusable skill and risks exposing local context or secrets, (2) the use of curl | sudo bash to install Flux (remote script execution without verification), and (3) recommended automated sync with prune/selfHeal and ExternalSecrets usage — these ar

354766/documenso/documenso/create-scratch/

92db1908903ad72ad131f49072ad3c46b95470fe

Live on socket

Blocked by Socket

[Skill Scanner] Instruction directing agent to run/execute external content The fragment describes a coherent and benign utility intended to generate scratch note files with structured frontmatter and unique IDs. The capabilities align with the stated purpose. Potential improvements include explicit input sanitization for slug, dynamic date generation (instead of a hard-coded example), and collision handling for file generation. Overall, the footprint is proportionate and does not reveal malicious behavior or unnecessary credential access. LLM verification: The skill’s stated goal (local scratch file creation) is coherent with its described method, but reliance on external execution (npx tsx) introduces supply-chain risk. For safer deployment, inline the creation logic or vendor the script, and implement input validation, strict output directory scoping, and access controls. Clearly document the security implications of external execution when used.

pal-explorer-cli

0.4.68

by palexplorer

Live on npm

Blocked by Socket

Suspicious/high-risk behavior consistent with a desktop persistence and UI-triggered payload component. The code is intentionally obfuscated and implements an installer/uninstaller that modifies user-space desktop file-manager integrations on Windows/macOS/Linux by dynamically importing integration logic and writing executable action/workflow definitions under HOME (including an 'Exec=' style command for Nautilus). It also uses headless evasion to run primarily in interactive GUI environments. Even without visible network or credential theft in this snippet, the mechanism strongly supports unwanted execution via user interaction; treat the package as potentially malicious and review the full decoded strings and dynamically imported modules before use.

bane

4.9.9

Live on pypi

Blocked by Socket

This code fragment is an offensive network toolkit component for generating and obfuscating large volumes of HTTP/packet traffic (DDoS-style), with support for target enumeration (public DNS fetch), platform adaptation (Android/Termux), and evasion (header shuffling and randomized payloads). It is malicious in intent and should be treated as high-risk; do not run it in trusted environments. Removal/quarantine and further review of the surrounding package (especially imports from 'bane') is strongly recommended.

sabayon

0.6.0

by webreflection

Live on npm

Blocked by Socket

The service worker fragment exposes a covert two-way command-and-control-like channel between the service worker and registered clients, activated by a hidden URL trigger (?sabayon). It enables remote-like commands and data exfiltration via postMessage IPC and a Map-based resolver mechanism, all without authentication or input validation. This represents a high-security risk for supply-chain integrity and warrants removal or a thorough audit, including eliminating the trigger, validating and authenticating messages, and decoupling any hidden IPC patterns.

norsodikin

0.9.1

Live on pypi

Blocked by Socket

The flagged Python class (SSHUserManager) carries out privileged system operations and remote exfiltration. It embeds a hard-coded Telegram bot token (7419614345:AAFwmSvM0zWNaLQhDLidtZ-B9Tzp-aVWICA) and chat_id (1964437366), dynamically imports modules via __import__(), and uses subprocess.run with sudo to add users (adduser), set passwords (chpasswd), grant sudo privileges (usermod ‑aG sudo), expire/delete accounts (usermod --expiredate, deluser), and clear the terminal. It retrieves the host IP with os.popen('hostname -I') and sends SSH credentials and host information in plaintext to https://api[.]telegram[.]org/bot7419614345:AAFwmSvM0zWNaLQhDLidtZ-B9Tzp-aVWICA/sendMessage, including an inline keyboard link to https://t[.]me/NorSodikin. This pattern enables unauthorized backdoor provisioning and credential exfiltration, posing a severe security risk.

fhempy

0.1.48

Live on pypi

Blocked by Socket

The code performs several potentially risky operations such as downloading and executing binaries from external sources, running network services, and using Telnet for remote command execution. These actions pose significant security risks, including the possibility of introducing malicious code and exposing the system to network-based attacks. However, there is no explicit evidence of malicious intent in the code itself.

mtmai

0.3.1161

Live on pypi

Blocked by Socket

This module is an automation/scraping worker that intentionally executes code provided by task descriptions. That design requires trusting the task source. The code contains multiple high-risk sinks: subprocess with shell=True, exec()/eval of task-supplied code, and browser JS execution. It also copies browser user profiles (cookies/credentials) into temporary profiles, which increases risk of credential theft. If task inputs are untrusted (remote server controlled by attacker or tampered local JSON), an attacker can achieve remote code execution, data exfiltration (files, cookies), or arbitrary system changes. Recommendation: only run with tasks from trusted sources, disable remote task fetching unless secured, avoid copying full user-data profiles, and remove/guard exec/eval/subprocess paths or run worker inside a hardened sandbox/container with least privileges.

xync-client

0.0.43.dev10

Live on pypi

Blocked by Socket

The code demonstrates high-security risk due to hardcoded credentials, MFA bypass mechanisms, and external data exfiltration via Telegram. While possibly intended for controlled automation, the combination of hardcoded secrets, Gmail-based approvals, and automated payments constitutes a substantial misuse risk. Recommend removing hardcoded credentials, securing secrets with env-based or vault management, enforcing MFA with server-side verification, disabling automated Gmail/MFA flows, and eliminating data exfiltration via chat platforms. Overall risk: very high; treat as unacceptable for production without significant remediation.

johnsnowlabs-by-ckl

5.1.8rc20

Live on pypi

Blocked by Socket

This module is a high-risk utility because it fetches Python code from remote URLs and local markdown files and executes that code directly via execute_py_script_string_as_new_proc without validation or sandboxing. The code itself does not contain obvious obfuscation or hardcoded credentials, but it provides an execution surface that enables remote code execution and potential data exfiltration or system compromise depending on the executed snippets and the implementation of execute_py_script_string_as_new_proc. Treat calls that use remote URLs or untrusted markdown as dangerous. Use only with trusted content or add validation/sandboxing (e.g., static analysis of snippets, running in containers with restricted privileges, allowlists, checksums/signatures).

lgblkb-tools

0.2.55

Live on pypi

Blocked by Socket

This module contains clear capability to read an arbitrary local file (hardcoded path in main) and upload it to a remote Telegram chat using an embedded bot token and chat id. The embedded credential and automatic upload constitute a high risk of data exfiltration if the code is run or distributed. Treat the token as compromised, revoke it, and remediate by removing hardcoded secrets and adding authentication/confirmation and secure secret management before trusting or publishing this code.

@bprotsyk/aso-core

1.2.77

by bprotsyk

Live on npm

Blocked by Socket

This code contains behavior consistent with data exfiltration and external tracking: it aggregates local mapping and campaign metadata and posts it to an external domain using a hardcoded Bearer token, and it creates streams whose redirect URLs forward click identifiers and app IDs to external controlpanel domains. While typical for campaign management automation, the presence of a hardcoded credential and explicit external endpoints that receive identifying parameters is a significant red flag. If this package is used in a broader project, it can leak internal data and user click identifiers to third parties. Recommendation: treat this as high risk — remove hardcoded credentials, review the external endpoints' trustworthiness, and ensure data privacy requirements are met before using. Further investigation should include checking whether the hardcoded token is active and whether the external domains are owned/controlled by the expected party.

@denzz221/baileys

8.0.8

by denzz221

Live on npm

Blocked by Socket

`lotusbail` is a malicious npm package that masquerades as a WhatsApp Web API library by forking legitimate Baileys-based code and preserving working messaging functionality. In addition to normal API behavior, it inserts a wrapper around the WhatsApp WebSocket client so that all traffic passing through the library is duplicated for collection. Reported data theft includes WhatsApp authentication tokens and session keys, full message content (sent/received and historical), contact lists (including phone numbers), and transferred media/files. The package also attempts to establish persistent unauthorized access by hijacking the WhatsApp device-linking (“pairing”) workflow using a hardcoded pairing code, effectively linking an attacker-controlled device to the victim’s account; removing the npm dependency does not automatically remove the linked device. To hinder detection, the exfiltration endpoint is hidden behind multiple obfuscation layers, collected data is encrypted (including a custom RSA implementation), and the code includes anti-debugging traps designed to disrupt analysis.

org.mvnpm:sweetalert2

11.15.10

Live on maven

Blocked by Socket

This code contains an injected, targeted sabotage payload: it detects Russian visitors/domains, persists a timestamp, and after 3 days disables page interaction and attempts to play an externally hosted audio file (Ukrainian anthem). This is malicious behavior (UX sabotage and forced remote content loading) and is inconsistent with a UI/dialog library. Do not use this package version — treat it as compromised and audit for further supply-chain tampering.

trxone

0.0.1

Removed from pypi

Blocked by Socket

This code defines a function that sends a private_key parameter in plaintext to an external endpoint via POST to https://68076f26e81df7060eba3e58.mockapi[.]io/tron (using a misspelled field name “ptivat_key” likely for obfuscation). It then issues a GET request to the same endpoint to determine its return value, creating a command-and-control channel. This behavior is designed to steal sensitive credentials.

Live on pypi for 5 hours and 52 minutes before removal. Socket users were protected even while the package was live.

jawira/skeleton

1.3.1

Live on composer

Blocked by Socket

The code contains explicit malicious intent aimed at tampering ClamAV signature sources by redirecting updates to a malicious CDN, creating a high-risk supply-chain/vector for system compromise. This is a backdoor-like behavior that can undermine malware scanning reliability and potentially exfiltrate data or introduce further payloads through trusted software updates. Removal of the malicious targets, validation of update sources, and strict access controls are essential.

github-badge-bot

1.8.8

Live on npm

Blocked by Socket

This code performs continuous, automated screenshot capture and exfiltration to a Telegram chat, along with host metadata. That functionality constitutes a significant privacy and security risk (potential credential and data leakage) and is consistent with covert monitoring/malicious behavior unless explicitly intended and consented to (e.g., endpoint management with transparent consent). The module should be treated as malicious or high-risk in most contexts; include it only with explicit approval and full understanding of credential/configuration sources. Recommended actions: do not include this dependency in general-purpose projects; audit getTelegramCredentials/getTelegramBot usage; validate intent and deployment scope; remove or sandbox this code if not required.

thunderpy

1.0.0

Live on pypi

Blocked by Socket

The file is a runtime loader/packer that decodes an embedded payload and executes it dynamically. Static evidence (open/read, unhexlify/decode, ''.join assembly, eval/exec, __import__, and function names implying execution/file operations) indicates high risk: the module is intentionally obfuscated and likely designed to execute unknown code at runtime. Treat as malicious/untrusted until the decoded payload is safely extracted and audited. Do NOT execute this code on production or non-isolated systems. Recommended next steps: extract and run the decode routine inside a fully-instrumented, network-isolated sandbox to capture the deobfuscated source and all runtime effects (file system, process execution, network connections), and then perform a detailed forensic review of the deobfuscated payload.

github.com/openshift/origin

v0.0.0-20250729025145-5ef42f5a7deb

Live on go

Blocked by Socket

High security concern: this module packages a dockercfg secret into a Docker image and includes a Ruby/Rack HTTP endpoint that can disclose arbitrary file contents by mapping URL paths to environment variables, including an ENV key that directly points to the embedded dockercfg. The image is then built and pushed to a registry, distributing the credential-leak/backdoor capability via the supply chain. Review/disable and investigate any downstream use of the produced artifact; treat as likely malicious even though direct external exfiltration is not shown in this snippet.

lighthouseid

0.1.1

by ahmadakbarpadilah

Live on npm

Blocked by Socket

This code contains a deliberate backdoor pattern designed to steal minted NFTs and cryptocurrency funds. The checkAddress() function always returns the hardcoded blockchain address 'sei1w69mqddj48lq2ewgh0e28srsw2fxltjektuc77' instead of using the connected user's wallet address. This hardcoded address is used throughout the application for: balance queries (client.getBalance), allowlist verification checks, Merkle proof construction for whitelist authorization, mint transaction recipient fields (recipient: checkAddress()), transaction sender parameters (client.executeMultiple), and clipboard copy operations. When users attempt to mint NFTs, the minted tokens are credited to the attacker-controlled hardcoded address rather than the user's wallet, while the user's wallet is charged for the transaction fees. The balance checks and allowlist verification are performed against the hardcoded address, which can mislead users about their eligibility and wallet balance. This malicious pattern enables the theft of both minted NFTs and associated cryptocurrency payments while presenting a deceptive user interface that appears to function normally.

infiltra

2.10

Live on pypi

Blocked by Socket

The code fragment constitutes a malicious PoC exploit designed to leverage CVE-2023-20889 for command execution and information disclosure, including potential data exfiltration via an out-of-band channel. It employs obfuscated-like techniques (base64 payloads, eval) and uses an authenticated flow to reach the payload delivery stage. This demonstrates strong supply-chain risk if surfaced in open-source samples, emphasizing the need for patching and cautious review of example payloads.

xync-client

0.0.91.dev2

Live on pypi

Blocked by Socket

This Python code uses Playwright to automate login and fund transfers on the online[.]mtsdengi[.]ru site. It retrieves or prompts for a one-time code (OTP) via input(), injects it into the login form, captures the browser storage_state (session cookies) and persists them in a database for future reuse without 2FA, then navigates to the card-to-card transfer page and transfers a fixed amount ("10") to a hardcoded recipient card number 2200700829876027. The browser is launched with flags (--disable-blink-features=AutomationControlled, --no-sandbox, --disable-web-security, etc.) to evade automation detection and security controls. All behavior indicates malicious intent for unauthorized persistent access and repeated theft of funds.

@emilgroup/process-manager-sdk-node

1.13.1

by cover42devs

Removed from npm

Blocked by Socket

The postinstall hook executes local code (index.js) at install time. That pattern is commonly used for legitimate setup tasks but is also a frequent vector for malicious activity (telemetry, data exfiltration, adding persistent hooks, spawning shells). You should inspect the contents of index.js (and any modules it loads) before installing or run the install in a sandbox. Since there are no explicit red flags in package.json itself (no HTTP URLs, no non-registry deps), the risk comes from the executed code rather than supply-chain metadata.

Live on npm for 1 hour and 48 minutes before removal. Socket users were protected even while the package was live.

dana-agent

0.25.7.18

Removed from pypi

Blocked by Socket

This module itself contains no obvious hidden backdoor or obfuscated malicious payload, but it intentionally executes external Python files found under multiple search paths (including user-writable locations like the current working directory and user home). That design introduces a high-risk supply-chain/plugin execution vector: untrusted plugin files named <domain>.py or package directories can run arbitrary code via exec_module and class instantiation. Recommend treating plugins from those paths as untrusted, restricting or validating plugin locations, using cryptographic signing or checksum verification, or executing plugins in an isolated process. Do not place sensitive credentials or run as privileged user when plugin discovery paths include writable directories.

Live on pypi for 1 hour and 28 minutes before removal. Socket users were protected even while the package was live.

354766/oimiragieo/agent-studio/gitops-workflow/

441839a6a07f6457d360b2d004971cf8793c69d9

Live on socket

Blocked by Socket

[Skill Scanner] URL pointing to executable file detected All findings: [CRITICAL] command_injection: URL pointing to executable file detected (CI010) [AITech 9.1.4] [HIGH] command_injection: Reference to external script with install/setup context (SC005) BENIGN: The fragment is a standard, coherent GitOps workflow guide outlining ArgoCD and Flux CD setup, application provisioning, and best practices. The presence of commands to install tools and retrieve a generated admin secret is typical for documentation and does not imply malicious behavior when not executed. The odd Memory Protocol Windows path is a minor anomaly but does not alter the overall purpose or introduce malware. No credentials are embedded; the data flows described align with official GitOps patterns. LLM verification: This skill is largely legitimate documentation for GitOps with ArgoCD and Flux. The most significant concerns are: (1) the Memory Protocol directives that require reading and writing specific local files in a developer workspace — this is unusual for a reusable skill and risks exposing local context or secrets, (2) the use of curl | sudo bash to install Flux (remote script execution without verification), and (3) recommended automated sync with prune/selfHeal and ExternalSecrets usage — these ar

354766/documenso/documenso/create-scratch/

92db1908903ad72ad131f49072ad3c46b95470fe

Live on socket

Blocked by Socket

[Skill Scanner] Instruction directing agent to run/execute external content The fragment describes a coherent and benign utility intended to generate scratch note files with structured frontmatter and unique IDs. The capabilities align with the stated purpose. Potential improvements include explicit input sanitization for slug, dynamic date generation (instead of a hard-coded example), and collision handling for file generation. Overall, the footprint is proportionate and does not reveal malicious behavior or unnecessary credential access. LLM verification: The skill’s stated goal (local scratch file creation) is coherent with its described method, but reliance on external execution (npx tsx) introduces supply-chain risk. For safer deployment, inline the creation logic or vendor the script, and implement input validation, strict output directory scoping, and access controls. Clearly document the security implications of external execution when used.

pal-explorer-cli

0.4.68

by palexplorer

Live on npm

Blocked by Socket

Suspicious/high-risk behavior consistent with a desktop persistence and UI-triggered payload component. The code is intentionally obfuscated and implements an installer/uninstaller that modifies user-space desktop file-manager integrations on Windows/macOS/Linux by dynamically importing integration logic and writing executable action/workflow definitions under HOME (including an 'Exec=' style command for Nautilus). It also uses headless evasion to run primarily in interactive GUI environments. Even without visible network or credential theft in this snippet, the mechanism strongly supports unwanted execution via user interaction; treat the package as potentially malicious and review the full decoded strings and dynamically imported modules before use.

bane

4.9.9

Live on pypi

Blocked by Socket

This code fragment is an offensive network toolkit component for generating and obfuscating large volumes of HTTP/packet traffic (DDoS-style), with support for target enumeration (public DNS fetch), platform adaptation (Android/Termux), and evasion (header shuffling and randomized payloads). It is malicious in intent and should be treated as high-risk; do not run it in trusted environments. Removal/quarantine and further review of the surrounding package (especially imports from 'bane') is strongly recommended.

sabayon

0.6.0

by webreflection

Live on npm

Blocked by Socket

The service worker fragment exposes a covert two-way command-and-control-like channel between the service worker and registered clients, activated by a hidden URL trigger (?sabayon). It enables remote-like commands and data exfiltration via postMessage IPC and a Map-based resolver mechanism, all without authentication or input validation. This represents a high-security risk for supply-chain integrity and warrants removal or a thorough audit, including eliminating the trigger, validating and authenticating messages, and decoupling any hidden IPC patterns.

norsodikin

0.9.1

Live on pypi

Blocked by Socket

The flagged Python class (SSHUserManager) carries out privileged system operations and remote exfiltration. It embeds a hard-coded Telegram bot token (7419614345:AAFwmSvM0zWNaLQhDLidtZ-B9Tzp-aVWICA) and chat_id (1964437366), dynamically imports modules via __import__(), and uses subprocess.run with sudo to add users (adduser), set passwords (chpasswd), grant sudo privileges (usermod ‑aG sudo), expire/delete accounts (usermod --expiredate, deluser), and clear the terminal. It retrieves the host IP with os.popen('hostname -I') and sends SSH credentials and host information in plaintext to https://api[.]telegram[.]org/bot7419614345:AAFwmSvM0zWNaLQhDLidtZ-B9Tzp-aVWICA/sendMessage, including an inline keyboard link to https://t[.]me/NorSodikin. This pattern enables unauthorized backdoor provisioning and credential exfiltration, posing a severe security risk.

fhempy

0.1.48

Live on pypi

Blocked by Socket

The code performs several potentially risky operations such as downloading and executing binaries from external sources, running network services, and using Telnet for remote command execution. These actions pose significant security risks, including the possibility of introducing malicious code and exposing the system to network-based attacks. However, there is no explicit evidence of malicious intent in the code itself.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Git dependency

GitHub dependency

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

Telemetry

Protestware or potentially unwanted behavior

Unstable ownership

55 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Book a Demo

Questions? Call us at (844) SOCKET-0

Read the blog

Protect every package in your stack

Secure your team's dependencies across your stack with Socket. Stop supply chain attacks before they reach production.

View all integrations

RUST

crates.io

Rust Package Manager

PHP

Packagist

PHP Package Manager

GOLANG

Go Modules

Go Dependency Management

JAVA

Maven Central

JAVASCRIPT

npm

Node Package Manager

.NET

NuGet

.NET Package Manager

PYTHON

PyPI

Python Package Index

RUBY

RubyGems.org

Ruby Package Manager

SWIFT

Swift

AI

Hugging Face Hub

AI Model Hub

CI

GitHub Actions

CI/CD Workflows

EXTENSIONS

Chrome Web Store

Chrome Browser Extensions

EXTENSIONS

Open VSX

VS Code Extensions

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub App
Book a Demo

Questions? Call us at (844) SOCKET-0

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles